Lucene search

K
ibmIBMCB2538BF74AE164F8E53C0929D143A920D7EBED88546FF2975773195ECA55434
HistoryJun 16, 2018 - 9:14 p.m.

Security Bulletin: IBM Tivoli Access Manager - token authentication RSA SecurID library uses weak cryptography (CVE-2013-0941)

2018-06-1621:14:17
www.ibm.com
10

2.1 Low

CVSS2

Access Vector

LOCAL

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:L/AC:L/Au:N/C:P/I:N/A:N

Summary

This bulletin applies to the WebSEAL component of Tivoli Access Manager for e-business (TAM) systems participating in token authentication. Earlier versions of the Authentication API provided by RSA used poor cryptography in generating keys which are used to encrypt communications between the WebSEAL system and the RSA Server when performing RSA SecurID token authentication.

Vulnerability Details

CVE-2013-0941

DESCRIPTION:
The WebSEAL component of TAM supports token authentication through integration with the RSA SecurId token authentication product. To support this integration, TAM includes an authentication module, commonly referred to as a โ€œCDASโ€ module that includes a library provided by RSA. This library provides the client components of the RSA Authentication API that communicate with the RSA authentication server.

An updated library has been provided by RSA, which is included in the patched versions of IBM Tivoli Access Manager for e-business (TAM). After applying the patch, customers must remove existing node secret files from affected WebSEAL systems and regenerate them.

The attack requires administrative access to the file system of the WebSEAL server, and specialized knowledge and techniques to manipulate the file. An exploit would not impact accessibility of system resources, but it could affect the confidentiality of information and the integrity of some of the data used in the communications between the TAM WebSEAL system and the RSA authentication server.

CVE ID:
CVE-2013-0941

CVSS:
CVSS Base Score: 3.6
CVSS Temporal Score: See <https://exchange.xforce.ibmcloud.com/vulnerabilities/84319&gt;
CVSS Environmental Score*: Undefined
CVSS Vector: (AV:N/AC:H/Au:S/C:P/I:P/A:N)

Affected Products and Versions

ยท Tivoli Access Manager 5.1 (out of service)
ยท Tivoli Access Manager 6.0.0 versions before fixpack 29.
ยท Tivoli Access Manager 6.1.0 versions before fixpack 10.
ยท Tivoli Access Manager 6.1.1 versions before fixpack 6.

Remediation/Fixes

Customers using version 5.1 should upgrade to a supported version of the product.

Remediation consists of the following steps:
1. Patch server systems. RSA will be providing patches and instructions in a separate advisory. For more information, visit the below link (authentication required) (https://knowledge.rsasecurity.com/scolcms/set.aspx?id=9718).
2. Obtain and apply the patch for WebSEAL systems, referring to the โ€œVendor Fixesโ€ chart at the end of this section.
3. IMPORTANT: Follow the instructions in the patch README file to replace any existing node secret files after the patch has been installed.

Vendor Fixes: Patches and installation instructions are provided at the URLs listed below.

Fix Build APAR Download URL
6.1.1-ISS-AWS-FP0006 120824 IV30723 http://www.ibm.com/support/docview.wss?uid=swg24033436
6.1.0-ISS-AWS-IF0010 121030 IV30727 http://www.ibm.com/support/docview.wss?uid=swg24033715
6.0.0-ISS-AWS-IF0029 121030 IV30724 http://www.ibm.com/support/docview.wss?uid=swg24033716

_
_IMPORTANT: RSA has not provided an updated library for the AIX 5.1, Sparc Solaris 8, or HP 9000 operating systems. You will not be able to correct this vulnerability on that platform. You must instead migrate affected systems running the WebSEAL component of TAM to a different supported operating system that has the updated RSA library. Contact IBM Services for more information if you require assistance migrating.

Get Notified about Future Security Bulletins

Subscribe to [My Notifications](< http://www-01.ibm.com/software/support/einfo.html&gt;) to be notified of important product support alerts like this.

References

Complete CVSS v2 Guide
On-line Calculator v2

Off


http://xforce.iss.net/xforce/xfdb/84319
http://www-01.ibm.com/support/docview.wss?uid=swg24033436
http://www-01.ibm.com/support/docview.wss?uid=swg24033715
http://www-01.ibm.com/support/docview.wss?uid=swg24033716

Related Information

IBM Secure Engineering Web Portal
IBM Product Security Incident Response Blog

https://knowledge.rsasecurity.com/scolcms/set.aspx?id=9718

*The CVSS Environment Score is customer environment specific and will ultimately impact the Overall CVSS Score. Customers can evaluate the impact of this vulnerability in their environments by accessing the links in the Reference section of this Security Bulletin.

Disclaimer

According to the Forum of Incident Response and Security Teams (FIRST), the Common Vulnerability Scoring System (CVSS) is an โ€œindustry open standard designed to convey vulnerability severity and help to determine urgency and priority of response.โ€ IBM PROVIDES THE CVSS SCORES โ€œโ€œAS ISโ€โ€ WITHOUT WARRANTY OF ANY KIND, INCLUDING THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. CUSTOMERS ARE RESPONSIBLE FOR ASSESSING THE IMPACT OF ANY ACTUAL OR POTENTIAL SECURITY VULNERABILITY. In addition to other efforts to address potential vulnerabilities, IBM periodically updates the record of components contained in our product offerings. As part of that effort, if IBM identifies previously unidentified packages in a product/service inventory, we address relevant vulnerabilities regardless of CVE date. Inclusion of an older CVEID does not demonstrate that the referenced product has been used by IBM since that date, nor that IBM was aware of a vulnerability as of that date. We are making clients aware of relevant vulnerabilities as we become aware of them. โ€œAffected Products and Versionsโ€ referenced in IBM Security Bulletins are intended to be only products and versions that are supported by IBM and have not passed their end-of-support or warranty date. Thus, failure to reference unsupported or extended-support products and versions in this Security Bulletin does not constitute a determination by IBM that they are unaffected by the vulnerability. Reference to one or more unsupported versions in this Security Bulletin shall not create an obligation for IBM to provide fixes for any unsupported or extended-support products or versions.

[{โ€œProductโ€:{โ€œcodeโ€:โ€œSSPREKโ€,โ€œlabelโ€:โ€œTivoli Access Manager for e-businessโ€},โ€œBusiness Unitโ€:{โ€œcodeโ€:โ€œBU059โ€,โ€œlabelโ€:โ€œIBM Software w/o TPSโ€},โ€œComponentโ€:โ€œNot Applicableโ€,โ€œPlatformโ€:[{โ€œcodeโ€:โ€œPF025โ€,โ€œlabelโ€:โ€œPlatform Independentโ€}],โ€œVersionโ€:โ€œ5.1;6.0;6.1;6.1.1โ€,โ€œEditionโ€:โ€œโ€,โ€œLine of Businessโ€:{โ€œcodeโ€:โ€œLOB24โ€,โ€œlabelโ€:โ€œSecurity Softwareโ€}}]

2.1 Low

CVSS2

Access Vector

LOCAL

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:L/AC:L/Au:N/C:P/I:N/A:N

Related for CB2538BF74AE164F8E53C0929D143A920D7EBED88546FF2975773195ECA55434