In association with heise online

14 July 2007, 11:32

RSA releases patches for several products

  • Twitter
  • Facebook
  • submit to slashdot
  • StumbleUpon
  • submit to reddit

Security service provider TippingPoint has released a security advisory reporting a security hole in server products of Progress Software, which also compromises third-party products, including products by RSA. The vulnerability is based on a heap overflow on the Progress Server (_mprosrv.exe) listening on TCP ports 5520 and 5530 when processing parameters of excessive length. According to TippingPoint, this allows remote attackers to inject and execute arbitrary code with system privileges. The security advisory does not provide information on whether the vendor will provide its own updates for the affected products Progress 9.1E and OpenEdge 10.1x. However, RSA provides patches for RSA ACE/Server 5.2, RSA Authentication Manager 6.0, RSA Authentication Manager 6.1 and RSA SecurID Appliance 2.0 and has obviously informed its clients on the problem on June 28 already.

While users of TippingPoint’s Digital Vaccine IPS solution should have been protected from this threat through signatures since June 22, vendor 3Com, who owns TippingPoint, has released two security advisories describing how the IPS can be bypassed. To do so, packets must be fragmented in a specific manner. The vulnerability affects IP systems with TOS versions 2.1, 2.2.0 to 2.2.4 and 2.5.0 to 2.5.1. Attackers could also bypass detection by inserting slashes in Unicode coding in an URI. This flaw affects TOS version 2.1 and versions 2.2.0 to 2.2.4. TippingPoint provides patches which can be downloaded by registered clients.

See also:

(mba)

Print Version | Send by email | Permalink: http://h-online.com/-733242
 


  • July's Community Calendar





The H Open

The H Security

The H Developer

The H Internet Toolkit