Lucene search

K
securityvulnsSecurityvulnsSECURITYVULNS:DOC:24870
HistoryOct 11, 2010 - 12:00 a.m.

ESA-2010-018: RSA Security Advisory: RSA, The Security Division of EMC, announces a fix for a potential security vulnerability in RSAR Authentication Client when storing secret key objects on an RSA SecurIDR 800 Authenticator

2010-10-1100:00:00
vulners.com
41

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

ESA-2010-018: RSA Security Advisory: RSA, The Security Division of EMC, announces a fix for a potential security vulnerability in RSA®
Authentication Client when storing secret key objects on an RSA SecurID® 800 Authenticator

RSA Authentication Client 2.0.x, 3.0, and 3.5.x contain a potential vulnerability that could allow the unintended extraction, by a
properly authenticated user, of secret (or symmetric) key objects stored on an RSA SecurID 800 Authenticator. This potential vulnerability
is corrected in RSA Authentication Client 3.5.3.

Description:

CVE Identifier: CVE-2010-3321

RSA Authentication Client can be used to store secret key objects on an RSA SecurID 800 hybrid authenticator using the PKCS#11 API.
According to PKCS#11 specifications, secret key objects tagged as SENSITIVE and NON-EXTRACTABLE cannot be exported from the device. This
option safeguards against the possibility of a key being used in a manner for which it was not originally intended by the developer of the
application (e.g., a user copying the key to another device). Affected versions of RSA Authentication Client ignore the SENSITIVE and
NON-EXTRACTABLE tags for secret key objects and allow these objects to be extracted by a properly authenticated user.

Affected Products:

Any version of RSA Authentication Client used only with RSA SecurID 800 authenticators to store secret key objects tagged as SENSITIVE
and NON-EXTRACTABLE.

Platforms:

Includes all OS versions of RSA Authentication Client

Unaffected Products:

The following RSA Authentication Client and RSA SecurID 800 use cases are NOT impacted by this vulnerability:

* Use of the SecurID 800 authenticator as an RSA SecurID one-time passcode (OTP) generator
* Secure storage of digital certificates or other asymmetric keys
* Secure storage of secret key objects that are intended to be extractable (e.g., password storage)

Recommendation:

Customers using RSA Authentication Client and PKCS#11 to store SENSITIVE and NON-EXTRACTABLE secret key objects on RSA SecurID 800
authenticators should upgrade to RSA Authentication Client 3.5.3 as soon as possible. Customers using RSA Authentication Client and the
RSA SecurID 800 authenticator for any other purposes are not impacted by this announcement and do not need to upgrade at this time.

Common Vulnerability Scoring System (CVSS) Base Score:

The Common Vulnerability Scoring System (CVSS) score for the item identified in this advisory is 1.5 (AV:L/AC:M/Au:S/C:P/I:N/A:N). For
more information on CVSS scoring, please see the Knowledge Base Article, "Security Advisories Severity Rating" at
https://knowledge.rsasecurity.com/scolcms/knowledge.aspx?solution=a46604.

Credits:

RSA would like to thank Graham Steele, LSV, INRIA & CNRS & ENS-Cachan as well as Matteo Bortolozzo, Matteo Centenaro and Riccardo
Focardi, Universita Ca'Foscari for reporting this issue.

Obtaining Documentation:

To obtain RSA documentation, log on to RSA SecurCare Online at https://knowledge.rsasecurity.com and click Products in the top navigation
menu. Select the specific product whose documentation you want to obtain. Scroll to the section for the product version that you want and
click the set link.

Obtaining More Information:

For more information about RSA SecurID, visit the RSA web site at http://www.rsa.com/node.aspx?id=1156.

Getting Support and Service:

For customers with current maintenance contracts, contact your local RSA Customer Support center with any additional questions regarding
this RSA SecurCare Note. For contact telephone numbers or e-mail addresses, log on to RSA SecurCare Online at
https://knowledge.rsasecurity.com, click Help & Contact, and then click the Contact Us - Phone tab or the Contact Us - Email tab.

General Customer Support Information:

http://www.rsa.com/node.aspx?id=1264

RSA SecurCare Online:

https://knowledge.rsasecurity.com

EOPS Policy:

RSA has a defined End of Primary Support policy associated with all major versions. Please refer to the link below for additional details.
http://www.rsa.com/node.aspx?id=2575

SecurCare Online Security Advisories

RSA, The Security Division of EMC, distributes SCOL Security Advisories in order to bring to the attention of users of the affected RSA
products important security information. RSA recommends that all users determine the applicability of this information to their individual
situations and take appropriate action. The information set forth herein is provided "as is" without warranty of any kind. RSA disclaim
all warranties, either express or implied, including the warranties of merchantability, fitness for a particular purpose, title and
non-infringement. In no event shall RSA or its suppliers be liable for any damages whatsoever including direct, indirect, incidental,
consequential, loss of business profits or special damages, even if RSA or its suppliers have been advised of the possibility of such
damages. Some states do not allow the exclusion or limitation of liability for consequential or incidental damages so the foregoing
limitation may not apply.

About RSA SecurCare Notes & Security Advisories Subscription

RSA SecurCare Notes & Security Advisories are targeted e-mail messages that RSA sends you based on the RSA product family you currently
use. If you'd like to stop receiving RSA SecurCare Notes & Security Advisories, or if you'd like to change which RSA product family Notes
& Security Advisories you currently receive, log on to RSA SecurCare Online at
https://knowledge.rsasecurity.com/scolcms/help.aspx?_v=view5. Following the instructions on the page, remove the check mark next to the
RSA product family whose Notes & Security Advisories you no longer want to receive. Click the Submit button to save your selection.

EMC Product Security Response Center
[email protected]
http://www.emc.com/contact-us/contact/product-security-response-center.htm

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.9 (Cygwin)

iEYEARECAAYFAkystKUACgkQtjd2rKp+ALxPJgCgiK1v3KqJNh/CMS0kiO4tzNCD
PkcAn2TIALVSjUayDQRQNWebwETxlWWV
=GQJ7
-----END PGP SIGNATURE-----

Related for SECURITYVULNS:DOC:24870