[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

ESA-2010-018: RSA Security Advisory: RSA, The Security Division of EMC, announces a fix for a potential security vulnerability in RSAR Authentication Client when storing secret key objects on an RSA SecurIDR 800 Authenticator







-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

ESA-2010-018: RSA Security Advisory: RSA, The Security Division of EMC, 
announces a fix for a potential security vulnerability in RSA® Authentication 
Client when storing secret key objects on an RSA SecurID® 800 Authenticator


RSA Authentication Client 2.0.x, 3.0, and 3.5.x contain a potential 
vulnerability that could allow the unintended extraction, by a properly 
authenticated user, of secret (or symmetric) key objects stored on an RSA 
SecurID 800 Authenticator. This potential vulnerability is corrected in RSA 
Authentication Client 3.5.3.


Description:

CVE Identifier: CVE-2010-3321

RSA Authentication Client can be used to store secret key objects on an RSA 
SecurID 800 hybrid authenticator using the PKCS#11 API. According to PKCS#11 
specifications, secret key objects tagged as SENSITIVE and NON-EXTRACTABLE 
cannot be exported from the device. This option safeguards against the 
possibility of a key being used in a manner for which it was not originally 
intended by the developer of the application (e.g., a user copying the key to 
another device). Affected versions of RSA Authentication Client ignore the 
SENSITIVE and NON-EXTRACTABLE tags for secret key objects and allow these 
objects to be extracted by a properly authenticated user.


Affected Products:

Any version of RSA Authentication Client used only with RSA SecurID 800 
authenticators to store secret key objects tagged as SENSITIVE and 
NON-EXTRACTABLE.


Platforms:

Includes all OS versions of RSA Authentication Client


Unaffected Products:

The following RSA Authentication Client and RSA SecurID 800 use cases are NOT 
impacted by this vulnerability:

    * Use of the SecurID 800 authenticator as an RSA SecurID one-time passcode 
(OTP) generator
    * Secure storage of digital certificates or other asymmetric keys
    * Secure storage of secret key objects that are intended to be extractable 
(e.g., password storage)


Recommendation:

Customers using RSA Authentication Client and PKCS#11 to store SENSITIVE and 
NON-EXTRACTABLE secret key objects on RSA SecurID 800 authenticators should 
upgrade to RSA Authentication Client 3.5.3 as soon as possible. Customers using 
RSA Authentication Client and the RSA SecurID 800 authenticator for any other 
purposes are not impacted by this announcement and do not need to upgrade at 
this time.


Common Vulnerability Scoring System (CVSS) Base Score:

The Common Vulnerability Scoring System (CVSS) score for the item identified in 
this advisory is 1.5 (AV:L/AC:M/Au:S/C:P/I:N/A:N). For more information on CVSS 
scoring, please see the Knowledge Base Article, "Security Advisories Severity 
Rating" at 
https://knowledge.rsasecurity.com/scolcms/knowledge.aspx?solution=a46604.


Credits:

RSA would like to thank Graham Steele, LSV, INRIA & CNRS & ENS-Cachan as well 
as Matteo Bortolozzo, Matteo Centenaro and Riccardo Focardi, Universita 
Ca'Foscari for reporting this issue.


Obtaining Documentation:

To obtain RSA documentation, log on to RSA SecurCare Online at 
https://knowledge.rsasecurity.com and click Products in the top navigation 
menu. Select the specific product whose documentation you want to obtain. 
Scroll to the section for the product version that you want and click the set 
link.


Obtaining More Information:

For more information about RSA SecurID, visit the RSA web site at 
http://www.rsa.com/node.aspx?id=1156.


Getting Support and Service:

For customers with current maintenance contracts, contact your local RSA 
Customer Support center with any additional questions regarding this RSA 
SecurCare Note. For contact telephone numbers or e-mail addresses, log on to 
RSA SecurCare Online at https://knowledge.rsasecurity.com, click Help & 
Contact, and then click the Contact Us - Phone tab or the Contact Us - Email 
tab.


General Customer Support Information:

http://www.rsa.com/node.aspx?id=1264


RSA SecurCare Online:

https://knowledge.rsasecurity.com


EOPS Policy:

RSA has a defined End of Primary Support policy associated with all major 
versions. Please refer to the link below for additional details.
http://www.rsa.com/node.aspx?id=2575


SecurCare Online Security Advisories

RSA, The Security Division of EMC, distributes SCOL Security Advisories in 
order to bring to the attention of users of the affected RSA products important 
security information. RSA recommends that all users determine the applicability 
of this information to their individual situations and take appropriate action. 
The information set forth herein is provided "as is" without warranty of any 
kind. RSA disclaim all warranties, either express or implied, including the 
warranties of merchantability, fitness for a particular purpose, title and 
non-infringement. In no event shall RSA or its suppliers be liable for any 
damages whatsoever including direct, indirect, incidental, consequential, loss 
of business profits or special damages, even if RSA or its suppliers have been 
advised of the possibility of such damages. Some states do not allow the 
exclusion or limitation of liability for consequential or incidental damages so 
the foregoing limitation may not apply.


About RSA SecurCare Notes & Security Advisories Subscription

RSA SecurCare Notes & Security Advisories are targeted e-mail messages that RSA 
sends you based on the RSA product family you currently use. If you'd like to 
stop receiving RSA SecurCare Notes & Security Advisories, or if you'd like to 
change which RSA product family Notes & Security Advisories you currently 
receive, log on to RSA SecurCare Online at 
https://knowledge.rsasecurity.com/scolcms/help.aspx?_v=view5. Following the 
instructions on the page, remove the check mark next to the RSA product family 
whose Notes & Security Advisories you no longer want to receive. Click the 
Submit button to save your selection.


EMC Product Security Response Center
Security_Alert@xxxxxxx
http://www.emc.com/contact-us/contact/product-security-response-center.htm

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.9 (Cygwin)

iEYEARECAAYFAkystKUACgkQtjd2rKp+ALxPJgCgiK1v3KqJNh/CMS0kiO4tzNCD
PkcAn2TIALVSjUayDQRQNWebwETxlWWV
=GQJ7
-----END PGP SIGNATURE-----