000033825 - RSA Authentication Manager 8.2 Multiple Vulnerabilities - False Positive

Document created by RSA Customer Support Employee on Aug 26, 2016
Version 1Show Document
  • View in full screen mode

Article Content

Article Number000033825
Applies ToRSA Product Set: RSA Authentication Manager
RSA Version/Condition: 8.2
CVE IDCVE-2016-4957, CVE-2016-4953, CVE-2016-4954, CVE-2016-4955, CVE-2016-4956
Article SummaryInformation requested by RSA Customer Support regarding the impact of certain vulnerabilities announced by the ntp.org open source development group in June 2016.
The reported vulnerabilities discussed are:

  • CVE-2016-4953 : Bad authentication demobilizes ephemeral associations
  • CVE-2016-4954 : Processing spoofed server packets
  • CVE-2016-4955 : Autokey association reset
  • CVE-2016-4956 : Broadcast interleaves
  • CVE-2016-4957 : Crypto-NAK crash
Link to Advisorieshttp://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2016-4953
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2016-4954
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2016-4955
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2016-4956
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2016-4957
http://support.ntp.org/bin/view/Main/SecurityNotice#June_2016_ntp_4_2_8p8_NTP_Securi
 
Alert ImpactNot Exploitable
Technical DetailsThe flaw exists but it is not exploitable
Technical Details Explanation
The following information is from http://support.ntp.org/bin/view/Main/SecurityNotice and NVD

CVE-2016-4953 - Bad authentication demobilizes ephemeral associations

Summary:
An attacker who knows the origin timestamp and can send a spoofed packet containing a CRYPTO-NAK to an ephemeral peer target before any other response is sent can demobilize that association.
CVSS3: LOW 3.7

Response: The flaw does not exist.

Authentication Manager is a client of time requests and not a server of time updates.


CVE-2016-4954 - Processing spoofed server packets

Summary: An attacker who is able to spoof packets with correct origin timestamps from enough servers before the expected response packets arrive at the target machine can affect some peer variables and, for example, cause a false leap indication to be set.
CVSS3: LOW 3.7

Response: The flaw does not exist.

Authentication Manager is a client of time requests and not a server of time updates.


CVE-2016-4955 - Autokey association reset

Summary: An attacker who is able to spoof a packet with a correct origin timestamp before the expected response packet arrives at the target machine can send a CRYPTO_NAK or a bad MAC and cause the association's peer variables to be cleared. If this can be done often enough, it will prevent that association from working.
CVSS3: LOW 3.7

Response: The flaw does not exist.

Authentication Manager is a client of time requests and not a server of time updates.


CVE-2016-4956 - Broadcast interleave

Summary: The fix for NTP Bug2978 CVE-2016-1548 does not cover broadcast associations, so broadcast clients can be triggered to flip into interleave mode.
CVSS3: LOW 3.7

Response: The flaw exists but cannot be exploited.

NTP on the Authentication Manager appliance is not configured as a broadcast client.


CVE-2016-4957 - Crypto-NAK crash

Summary:
The fix for CVE-2016-1547 in ntp-4.2.8p7 contained a bug that could cause ntpd to crash.
CVSS3: HIGH 7.5

Response: The flaw does not exist.

Authentication Manager is not running the vulnerable version of NTPD.

Notes


 

 

Disclaimer

Read and use the information in this RSA Security Advisory to assist in avoiding any situation that might arise from the problems described herein. If you have any questions regarding this product alert, contact RSA Software Technical Support at 1- 800 995 5095. RSA Security LLC and its affiliates, including without limitation, its ultimate parent company, EMC Corporation, distributes RSA Security Advisories in order to bring to the attention of users of the affected RSA products, important security information. RSA recommends that all users determine the applicability of this information to their individual situations and take appropriate action. The information set forth herein is provided 'as is' without warranty of any kind. RSA disclaims all warranties, either express or implied, including the warranties of merchantability, fitness for a particular purpose, title and non-infringement. In no event, shall RSA, its affiliates or suppliers, be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of business profits or special damages, even if RSA, its affiliates or suppliers have been advised of the possibility of such damages. Some jurisdictions do not allow the exclusion or limitation of liability for consequential or incidental damages, so the foregoing limitation may not apply.

Attachments

    Outcomes