lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-Id: <201207021850.q62Io7MV027694@sf01web1.securityfocus.com>
Date: Mon, 2 Jul 2012 18:50:07 GMT
From: Security_Alert@....com
To: bugtraq@...urityfocus.com
Subject: ESA-2012-026: RSA Access Manager Session Replay Vulnerability

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

ESA-2012-026: RSA&#65533; Access Manager Session Replay Vulnerability

EMC Identifier: ESA-2012-026
CVE Identifier: CVE-2012-2281
Severity Rating: CVSSv2 Base Score: 6. 8 (AV:A/AC:H/Au:N/C:C/I:C/A:C)



Affected Products:

&#65533;RSA Access Manager Server version 6.0.x
&#65533;RSA Access Manager Server version 6.1
&#65533;RSA Access Manager Server version 6.1 Service Pack 1
&#65533;RSA Access Manager Server version 6.1 Service Pack 2
&#65533;RSA Access Manager Server version 6.1 Service Pack 3
&#65533;All supported RSA Access Manager Agent versions


Unaffected Products:

&#65533;RSA Access Manager Server version 6.1 Service Pack 4

Summary:

RSA Access Manager contains a security vulnerability that can be potentially exploited by a malicious user in certain limited circumstances to replay the session.



Details:

RSA Access Manager contains a vulnerability that can be potentially exploited by a malicious user to replay the session with compromised session tokens. This is due to improper invalidation of session tokens after a user logs out from a
protected resource.



Recommendation:

To mitigate this vulnerability, RSA strongly recommends that all customers upgrade to RSA Access Manager 6.1 Service Pack 4 or apply the following security hot fixes, at the earliest opportunity. In addition, all supported RSA Access Man
ager Agents require configuration changes as documented in release notes and readme files.

&#65533;For RSA Access Manager Server version 6.0.x, upgrade to Service Pack 4 and then apply the security hot fix # AxM HF 6.0.4.64
&#65533;For RSA Access Manager Server version 6.0.4, apply security hot fix # AxM HF 6.0.4.64
&#65533;For RSA Access Manager Server version 6.1, upgrade to Service Pack 3 and then apply security hot fix # AxM HF 6.1.3.30
&#65533;For RSA Access Manager Server version 6.1 Service Pack 1, upgrade to Service Pack 3 and then apply security hot fix # AxM HF 6.1.3.30
&#65533;For RSA Access Manager Server version 6.1 Service Pack 2, upgrade to Service Pack 3 and then apply security hot fix # AxM HF 6.1.3.30
&#65533;For RSA Access Manager Server version 6.1 Service Pack 3, apply Security Hot fix # AxM HF 6.1.3.30
The hot fixes can be downloaded from SecurCare Online or by contacting RSA Security Customer Support. .



Severity Rating:

For an explanation of Severity Ratings, refer to the Knowledge Base Article, &#65533;Security Advisories Severity Rating&#65533; at https://knowledge.rsasecurity.com/scolcms/knowledge.aspx?solution=a46604. RSA recommends all customers take into accoun
t both the base score and any relevant temporal and environmental scores which may impact the potential severity associated with particular security vulnerability.



Obtaining Downloads:

To obtain the latest RSA product downloads, log on to RSA SecurCare Online at https://knowledge.rsasecurity.com and click Products in the top navigation menu. Select the specific product whose download you want to obtain. Scroll to the s
ection for the product download that you want and click on the link.



Obtaining Documentation:

To obtain RSA documentation, log on to RSA SecurCare Online at https://knowledge.rsasecurity.com and click Products in the top navigation menu. Select the specific product whose documentation you want to obtain. Scroll to the section for the product version that you want and click the set link.



Obtaining More Information:

For more information about RSA Access Manager, visit the RSA web site at http://www.rsa.com/node.aspx?id=1186.



Getting Support and Service:

For customers with current maintenance contracts, contact your local RSA Customer Support center with any additional questions regarding this RSA SecurCare Note. For contact telephone numbers or e-mail addresses, log on to RSA SecurCare
Online at https://knowledge.rsasecurity.com, click Help & Contact, and then click the Contact Us - Phone tab or the Contact Us - Email tab.



General Customer Support Information:

http://www.rsa.com/node.aspx?id=1264



RSA SecurCare Online:

https://knowledge.rsasecurity.com



EOPS Policy:

RSA has a defined End of Primary Support policy associated with all major versions. Please refer to the link below for additional details.
http://www.rsa.com/node.aspx?id=2575



About RSA SecurCare Notes & Security Advisories Subscription

RSA SecurCare Notes & Security Advisories are targeted e-mail messages that RSA sends you based on the RSA product family you currently use. If you&#65533;d like to stop receiving RSA SecurCare Notes & Security Advisories, or if you&#65533;d like to c
hange which RSA product family Notes & Security Advisories you currently receive, log on to RSA SecurCare Online at https://knowledge.rsasecurity.com/scolcms/help.aspx?_v=view3. Following the instructions on the page, remove the check ma
rk next to the RSA product family whose Notes & Security Advisories you no longer want to receive. Click the Submit button to save your selection.


EMC Product Security Response Center

Security_Alert@....com

http://www.emc.com/contact-us/contact/product-security-response-center.htm
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.12 (Cygwin)

iEYEARECAAYFAk/sm80ACgkQtjd2rKp+ALzgGwCfdJTl5TeeE+GKROiE6yu1onZ0
AQoAoM8NrHmj+AHVXZToTzE9HDFCQpCD
=g+xz
-----END PGP SIGNATURE-----


Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ