|
COMMAND ACE/Server SYSTEMS AFFECTED RSA's ACE/Server PROBLEM JJ Gray found following. RSA Security produce a 2 factor secure authentication solution called ACE/Server. This uses SecurID tokens to enforce authentication and runs on NT/2000 and Solaris. It is possible for a nonprivileged user on the same network as the ACE/Server to trivially produce a DoS attack that kills the aceserver process thus denying all authentication requests. Test Lab: ACE/Server version 3.1 and 4.1 on Solaris 2.6, Sparc Ultra5. Attack: A simple UDP portflooding at LAN speeds (250 packets/second) with randomly sized UDP packets at the port used for authentication requests, default is 5500,UDP. Process dies in 15-20 seconds. Result: The aceserver process dies and can no longer process any SecurID authentication requests, denying all access to any SecurID protected resources. The aceserver process has to be stopped/started to restore functionality. SOLUTION RSA Security has confirmed the report, and offers a patch for RSA ACE/Server R v3.3, 4.0 and 4.1. The RSA Security Support Lab tested the potential vulnerability by force-feeding servers with 1000 packets per second, without reproducing a process crash. In these tests, the server rode out the flood and recovered within minutes, without needing to be stopped or rebooted. RSA Security did detect a problem handling UDP packets which appeared to be a continuation of a previous session, but where no such session existed. RSA Security has repaired this function. Most resources with physical access to a network could be the target of a packet flood, though the volume of packets required varies. To reduce the potential vulnerability, RSA Security recommends: 1. Placing an intrusion detection or traffic monitor on the LAN. Most RSA ACE/Servers are on internal networks, behind firewalls. This limits access to the Server's UDP port to people on the local network, insiders. UDP attacks such as this are less likely to happen via the Internet. If the internal network has any form of traffic monitoring, such an attack is likely to be caught. 2. Locating RSA ACE / Server R in a protected environment, such as a DMZ, to block access by unauthorized users. Customers with current maintenance agreements can get the patch in the following patch releases from RSA SecurCare Online. -RSA ACE/Server R v3.3 patch 16 - Available now -RSA ACE/Server R 4.0 patch 2 - Available Q3 -RSA ACE/Server R 4.1 patch 1 - Available Q3 Until full patches are available, and for non-maintenance customers, a hotfix is available for each of these releases from our public FTP site, at ftp://ftp.securid.com/support/outgoing/dos