The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a vigilance database and tools to fix them.

Vulnerability of RSA ACE/Server, SecurID: buffer overflow of Progress Server

Synthesis of the vulnerability 

An attacker can generate a buffer overflow on Progress Server in order to execute code on system.
Impacted systems: ACE Server, RSA Authentication Agent, SecurID.
Severity of this alert: 3/4.
Creation date: 13/07/2007.
Références of this alert: CVE-2007-2417, TPTI-07-12, VIGILANCE-VUL-7007.

Description of the vulnerability 

The Progress Server, of Progress Software company, listens on 5520/tcp and 5530/tcp ports. The RSA Authentication Manager, RSA ACE/Server 5.2 and RSA SecurID Appliance products use this software.

The _mprosrv.exe process (Progress Server) stores received data in a 1012 bytes array without checking its size. An attacker can therefore create an overflow.

A non authenticated attacker can thus execute code with system privileges.
Full bulletin, software filtering, emails, fixes, ... (Request your free trial)

This weakness bulletin impacts software or systems such as ACE Server, RSA Authentication Agent, SecurID.

Our Vigil@nce team determined that the severity of this computer weakness is important.

The trust level is of type confirmed by a trusted third party, with an origin of intranet client.

An attacker with a expert ability can exploit this vulnerability announce.

Solutions for this threat 

RSA ACE/Server, SecurID: patch for Progress Server.
A patch is available:
RSA ACE/Server 5.2 + Patch 1:
RSA Authentication Manager 6.0 + Patch 2:
RSA SecurID Appliance 2.0 + Upgrade 2.0.1:
RSA Authentication Manager 6.1 + 6.1.2 patch:
Full bulletin, software filtering, emails, fixes, ... (Request your free trial)

Computer vulnerabilities tracking service 

Vigil@nce provides computer vulnerability patches. The technology watch team tracks security threats targeting the computer system.