Lucene search

K
securityvulnsSecurityvulnsSECURITYVULNS:DOC:11738
HistoryMar 08, 2006 - 12:00 a.m.

[SA19137] nCipher Products Multiple Vulnerabilities

2006-03-0800:00:00
vulners.com
10

TITLE:
nCipher Products Multiple Vulnerabilities

SECUNIA ADVISORY ID:
SA19137

VERIFY ADVISORY:
http://secunia.com/advisories/19137/

CRITICAL:
Less critical

IMPACT:
Security Bypass

WHERE:
>From remote

OPERATING SYSTEM:
nCipher payShield
http://secunia.com/product/2831/
nCipher nShield
http://secunia.com/product/3096/
nCipher Document Sealing Engine (DSE 200)
http://secunia.com/product/8582/
nCipher KeepSecure
http://secunia.com/product/8581/
nCipher netHSM
http://secunia.com/product/3097/
nCipher nForce
http://secunia.com/product/8580/

SOFTWARE:
nCipher Cryptographic Hardware Interface Library (CHIL) 1.x
http://secunia.com/product/5479/

DESCRIPTION:
Some vulnerabilities have been reported in nCipher products, which
potentially can be exploited by malicious people to bypass certain
security restrictions.

1) An error in the HSM when choosing random parameters for use in the
generation Diffie-Hellman (DH) keys can cause weak private keys to be
generated. This can potentially be exploited to derive the private
key with significantly less effort than by brute force.

Successful exploitation requires access to the HSM and requires that
the DH keys are not generated using the Oakley group parameters.

The vulnerability has been reported in DH keys that are generated
using the following products:

  • The "generatekey" utility, the MSCAPI or JCECSP provider, or via
    CHIL from nCipher software CD versions prior to v9.0.
  • An application that uses the nCore API.

2) A design weakness in the nCore API may cause application
programmers to implement weak MAC protocols that transmits a non-zero
IV together with the message. This may cause the application to fail
to detect certain modifications to messages that the CBC-MAC is
supposed to protect.

3) Certain functionality within the firmware that are meant for
testing purposes may be exploited to generate keys with reduced
security properties. This can potentially be exploited to derive keys
with significantly less effort than by brute force.

The vulnerability has been reported in the following products:

  • nShield PCI or SCSI
  • nForce PCI or SCSI
  • netHSM
  • payShield PCI, SCSI and net
  • SecureDB
  • DSE200 Document Sealing Engine (including those bundled with
    pdfProof)
  • Time Source Master Clock (TSMC)

SOLUTION:
Update to V10 firmware version 2.22.6 or later. See vendor's original
advisory for non-affected firmware versions.

  • Weak DH keys must be discarded and replaced with newly generated
    keys. See vendor's original advisory for instructions.

PROVIDED AND/OR DISCOVERED BY:
Reported by vendor.

ORIGINAL ADVISORY:
http://www.ncipher.com/support/advisories/keysigs/advis12.txt.asc
http://www.ncipher.com/support/advisories/keysigs/advis13.txt.asc
http://www.ncipher.com/support/advisories/keysigs/advis14.txt.asc


About:
This Advisory was delivered by Secunia as a free service to help
everybody keeping their systems up to date against the latest
vulnerabilities.

Subscribe:
http://secunia.com/secunia_security_advisories/

Definitions: (Criticality, Where etc.)
http://secunia.com/about_secunia_advisories/

Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only
use those supplied by the vendor.