Article Number
000033825
CVE ID
CVE-2016-4957, CVE-2016-4953, CVE-2016-4954, CVE-2016-4955, CVE-2016-4956
Applies To
RSA Product Set: RSA Authentication Manager
RSA Version/Condition: 8.2
Article Summary
Information requested by RSA Customer Support regarding the impact of certain vulnerabilities announced by the ntp.org open source development group in June 2016.
The reported vulnerabilities discussed are:
- CVE-2016-4953 : Bad authentication demobilizes ephemeral associations
- CVE-2016-4954 : Processing spoofed server packets
- CVE-2016-4955 : Autokey association reset
- CVE-2016-4956 : Broadcast interleaves
- CVE-2016-4957 : Crypto-NAK crash
Link to Advisories
Alert Impact
Not Exploitable
Alert Impact Explanation
CVE-2016-4953 - Bad authentication demobilizes ephemeral associations
Summary:
An attacker who knows the origin timestamp and can send a spoofed packet containing a CRYPTO-NAK to an ephemeral peer target before any other response is sent can demobilize that association.
CVSS3: LOW 3.7
Response: The flaw does not exist.
Authentication Manager is a client of time requests and not a server of time updates.
CVE-2016-4954 - Processing spoofed server packets
Summary: An attacker who is able to spoof packets with correct origin timestamps from enough servers before the expected response packets arrive at the target machine can affect some peer variables and, for example, cause a false leap indication to be set.
CVSS3: LOW 3.7
Response: The flaw does not exist.
Authentication Manager is a client of time requests and not a server of time updates.
CVE-2016-4955 - Autokey association reset
Summary: An attacker who is able to spoof a packet with a correct origin timestamp before the expected response packet arrives at the target machine can send a CRYPTO_NAK or a bad MAC and cause the association's peer variables to be cleared. If this can be done often enough, it will prevent that association from working.
CVSS3: LOW 3.7
Response: The flaw does not exist.
Authentication Manager is a client of time requests and not a server of time updates.
CVE-2016-4956 - Broadcast interleave
Summary: The fix for NTP Bug2978 CVE-2016-1548 does not cover broadcast associations, so broadcast clients can be triggered to flip into interleave mode.
CVSS3: LOW 3.7
Response: The flaw exists but cannot be exploited.
NTP on the Authentication Manager appliance is not configured as a broadcast client.
CVE-2016-4957 - Crypto-NAK crash
Summary:
The fix for CVE-2016-1547 in ntp-4.2.8p7 contained a bug that could cause ntpd to crash.
CVSS3: HIGH 7.5
Response: The flaw does not exist.
Authentication Manager is not running the vulnerable version of NTPD.
Notes
Disclaimer
Read and use the information in this RSA Security Advisory to assist in avoiding any situation that might arise from the problems described herein. If you have any questions regarding this product alert, contact RSA Software Technical Support at 1- 800 995 5095. RSA Security LLC and its affiliates, including without limitation, its ultimate parent company, EMC Corporation, distributes RSA Security Advisories in order to bring to the attention of users of the affected RSA products, important security information. RSA recommends that all users determine the applicability of this information to their individual situations and take appropriate action. The information set forth herein is provided 'as is' without warranty of any kind. RSA disclaims all warranties, either express or implied, including the warranties of merchantability, fitness for a particular purpose, title and non-infringement. In no event, shall RSA, its affiliates or suppliers, be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of business profits or special damages, even if RSA, its affiliates or suppliers have been advised of the possibility of such damages. Some jurisdictions do not allow the exclusion or limitation of liability for consequential or incidental damages, so the foregoing limitation may not apply.