000032572 - Multiple Linux Kernel related vulnerabilities in Authentication Manager 8.1 SP1 P10 or later - False Positives

Document created by RSA Customer Support Employee on Jun 14, 2016Last modified by RSA Customer Support Employee on Apr 14, 2017
Version 2Show Document
  • View in full screen mode

Article Content

Article Number000032572
Applies ToRSA Authentication Manager 8.1 SP1 P10 or later
CVE IDCVE-2016-0728,CVE-2015-8787,CVE-2015-8709
Article SummarySUSE Linux Kernel related vulnerabilities:
- The join_session_keyring function in security/keys/process_keys.c in the Linux kernel
- The nf_nat_redirect_ipv4 function in net/netfilter/nf_nat_redirect.c in the Linux kernel
- kernel/ptrace.c in the Linux kernel
Link to Advisorieshttps://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2016-0728
https://www.suse.com/security/cve/CVE-2016-0728.html 
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2015-8787
https://www.suse.com/security/cve/CVE-2015-8787.html 
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2015-8709
https://www.suse.com/security/cve/CVE-2015-8709.html 
Alert ImpactNot Applicable
Technical DetailsFalse positive
Resolution

CVE-2016-0728


(https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2016-0728)


The join_session_keyring function in security/keys/process_keys.c in the Linux kernel before 4.4.1 mishandles object references in a certain error case, which allows local users to gain privileges or cause a denial of service (integer overflow and use-after-free) via crafted keyctl commands.


Response: The flaw does not exist


This problem affects Linux Kernels 3.8 and above, so SUSE Linux Enterprise 11 and older products are not affected. (https://www.suse.com/security/cve/CVE-2016-0728.html)


The RSA Authentication Manager 8.x does not use an impacted version of the OS.




CVE-2015-8787


(https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2015-8787)


The nf_nat_redirect_ipv4 function in net/netfilter/nf_nat_redirect.c in the Linux kernel before 4.4 allows remote attackers to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact by sending certain IPv4 packets to an incompletely configured interface, a related issue to CVE-2003-1604.


Response: The flaw does not exist


Problem only impacted openSUSE. (https://bugzilla.suse.com/show_bug.cgi?id=963931)


The RSA Authentication Manager 8.x does not use an impacted version of the OS.




CVE-2015-8709


(https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2015-8709)


DISPUTED ** kernel/ptrace.c in the Linux kernel through 4.4.1 mishandles uid and gid mappings, which allows local users to gain privileges by establishing a user namespace, waiting for a root process to enter that namespace with an unsafe uid or gid, and then using the ptrace system call.


Response: The flaw exists but does not add additional risk


The disputed issue involves an increase of privileges by a non-privileged local user. For the AM appliance there is only a single appliance user, a trusted administrator (as “rsaadmin” who already has root privileges). The potential impact of attacks on the system by the privileged administrator are described “the flaw exists but does not add additional risk” since there is already risk for the administrator to attack the system in much more straight forward means.

 

Disclaimer

Read and use the information in this RSA Security Advisory to assist in avoiding any situation that might arise from the problems described herein. If you have any questions regarding this product alert, contact RSA Software Technical Support at 1- 800 995 5095. RSA Security LLC and its affiliates, including without limitation, its ultimate parent company, EMC Corporation, distributes RSA Security Advisories in order to bring to the attention of users of the affected RSA products, important security information. RSA recommends that all users determine the applicability of this information to their individual situations and take appropriate action. The information set forth herein is provided 'as is' without warranty of any kind. RSA disclaims all warranties, either express or implied, including the warranties of merchantability, fitness for a particular purpose, title and non-infringement. In no event, shall RSA, its affiliates or suppliers, be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of business profits or special damages, even if RSA, its affiliates or suppliers have been advised of the possibility of such damages. Some jurisdictions do not allow the exclusion or limitation of liability for consequential or incidental damages, so the foregoing limitation may not apply.

Attachments

    Outcomes