Date: 22 December 2011
Click here for printable version
Click here for PGP verifiable version
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
===========================================================================
AUSCERT External Security Bulletin Redistribution
ESB-2011.1255.2
RSA SecureID Software Token 4.1 has been found to be
vulnerable to code execution via opening a malicous file.
22 December 2011
===========================================================================
AusCERT Security Bulletin Summary
---------------------------------
Product: SecureID Software Token 4.1
Publisher: RSA
Operating System: Windows 7
Windows XP
Windows Vista
Impact/Access: Execute Arbitrary Code/Commands -- Remote with User Interaction
Resolution: Patch/Upgrade
CVE Names: CVE-2011-4141
Original Bulletin:
https://knowledge.rsasecurity.com/scolcms/knowledge.aspx?solution=a46604
Comment: We have been advised that the SecureID software version 3.0 is vulnerable to this issue. However no
patch has been released for this version, users are advised up upgrade to version 4.1 and apply the
patch from the vendor.
Revision History: December 22 2011: Version 3.0 also affected
December 15 2011: Initial Release
- --------------------------BEGIN INCLUDED TEXT--------------------
- -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
ESA-2011-039: RSA, The Security Division of EMC, announces security fixes and
improvements for RSASecurID Software Token 4.1 for MicrosoftWindows
It has recently (22/11/11) come to our attention that this also affects version
3.0 of the SecurID software.
Advisories Updated December 12, 2011
Summary:
RSA, The Security Division of EMC, announces security fixes and improvements
for RSA SecurID Software Token 4.1 for Microsoft Windows This release
addresses an Insecure Library Loading vulnerability within RSA SecurID
Software Token for Windows (CVE-2011-4141). This release also provides an
alternate installation package for customers who do not require the software
token automation API features of the product. Further information about these
resolutions can be found in the RSA SecurID Software Token 4.1 for Microsoft
Windows Release Notes.
Platforms:
Windows 7 Enterprise SP1 32-bit and 64-bit Windows 7 Professional SP1 32-bit
and 64-bit Windows Vista Business SP2 32-bit and 64-bit Windows Vista
Enterprise SP2 32-bit and 64-bit Windows XP Professional SP3
Description:
This release addresses an Insecure Library Loading vulnerability within RSA
SecurID Software Token for Windows (CVE-2011-4141). This vulnerability may be
exploited to load arbitrary libraries by tricking a user into opening a
Software Token file located on a compromised or malicious share. The software
token automation API enables integration with leading VPN and remote access
applications so that users are only required to enter their usernames and
SecurID PINs for authentication. This release provides an alternative
installation package for customers who do not require the software token
automation API features. Support for backwards compatibility is provided by a
separate installation package that installs the software token automation API.
Both versions of the application will be available for direct download from
rsa.com.
Further information about these resolutions can be found in the RSA SecurID
Software Token 4.1 for Microsoft Windows Release Notes.
Affected Products:
RSA SecurID Software Token 4.1 for Microsoft Windows
Recommendation:
RSA strongly recommends that customers upgrade to RSA SecurID Software Token
4.1.1 for Microsoft Windows. If customers direct their end-users to download
the application directly from rsa.com, they should update their instructions
to ensure users download the correct version of the application.
Common Vulnerability Scoring System (CVSS) Base Score:
The Common Vulnerability Scoring System (CVSS) Base Score for CVE-2011-4141
is: 9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C). RSA recommends that all customers take
into account both the base score and any relevant temporal and environmental
scores, which may impact the potential severity associated with a particular
security vulnerability.
For more information on CVSS scoring, please see the Knowledge Base Article,
\x{147}Security Advisories Severity Rating\x{148} at
https://knowledge.rsasecurity.com/scolcms/knowledge.aspx?solution=a46604.
Credits:
RSA would like to thank Parvez Anwar working with Secunia (http://secunia.com)
for reporting this issue.
Obtaining Documentation:
To obtain RSA documentation, log on to RSA SecurCare Online at
https://knowledge.rsasecurity.com and click Products in the top navigation
menu. Select the specific product whose documentation you want to obtain.
Scroll to the section for the product version that you want and click the set
link.
Obtaining More Information:
For more information about RSA SecurID, visit the RSA web site at
http://www.rsa.com/node.aspx?id=1156.
Getting Support and Service:
For customers with current maintenance contracts, contact your local RSA
Customer Support center with any additional questions regarding this RSA
SecurCare Note. For contact telephone numbers or e-mail addresses, log on to
RSA SecurCare Online at https://knowledge.rsasecurity.com, click Help &
Contact, and then click the Contact Us - Phone tab or the Contact Us - Email
tab.
General Customer Support Information:
http://www.rsa.com/node.aspx?id=1264
RSA SecurCare Online:
https://knowledge.rsasecurity.com
EOPS Policy:
RSA has a defined End of Primary Support policy associated with all major
versions. Please refer to the link below for additional details.
http://www.rsa.com/node.aspx?id=2575
About RSA SecurCare Notes & Security Advisories Subscription
RSA SecurCare Notes & Security Advisories are targeted e-mail messages that
RSA sends you based on the RSA product family you currently use. If
you\x{146}d like to stop receiving RSA SecurCare Notes & Security Advisories,
or if you\x{146}d like to change which RSA product family Notes & Security
Advisories you currently receive, log on to RSA SecurCare Online at
https://knowledge.rsasecurity.com/scolcms/help.aspx?_v=view3. Following the
instructions on the page, remove the check mark next to the RSA product family
whose Notes & Security Advisories you no longer want to receive. Click the
Submit button to save your selection.
EMC Product Security Response Center Security_Alert@EMC.com
http://www.emc.com/contact-us/contact/product-security-response-center.htm
- -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.9 (Cygwin)
iEYEARECAAYFAk7o8uQACgkQtjd2rKp+ALz7rQCfYslXUgZW8Q4j15TMfpw88TF8
/SUAniCSUVITIiAHaER31Zvk2zURtXAw =8bbA
- -----END PGP SIGNATURE-----
- --------------------------END INCLUDED TEXT--------------------
You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.
NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members. As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.
NOTE: This is only the original release of the security bulletin. It may
not be updated when updates to the original are made. If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.
Contact information for the authors of the original document is included
in the Security Bulletin above. If you have any questions or need further
information, please contact them directly.
Previous advisories and external security bulletins can be retrieved from:
http://www.auscert.org.au/render.html?cid=1980
===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072
Internet Email: auscert@auscert.org.au
Facsimile: (07) 3365 7031
Telephone: (07) 3365 4417 (International: +61 7 3365 4417)
AusCERT personnel answer during Queensland business hours
which are GMT+10:00 (AEST).
On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967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=5OKE
-----END PGP SIGNATURE-----
|