-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                              ESB-2011.1255.2
           RSA SecureID Software Token 4.1 has been found to be
         vulnerable to code execution via opening a malicous file.
                             22 December 2011

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           SecureID Software Token 4.1
Publisher:         RSA
Operating System:  Windows 7
                   Windows XP
                   Windows Vista
Impact/Access:     Execute Arbitrary Code/Commands -- Remote with User Interaction
Resolution:        Patch/Upgrade
CVE Names:         CVE-2011-4141  

Original Bulletin: 
   https://knowledge.rsasecurity.com/scolcms/knowledge.aspx?solution=a46604

Comment: We have been advised that the SecureID software version 3.0 is vulnerable to this issue.  However no 
         patch has been released for this version, users are advised up upgrade to version 4.1 and apply the 
         patch from the vendor.

Revision History:  December 22 2011: Version 3.0 also affected
                   December 15 2011: Initial Release

- --------------------------BEGIN INCLUDED TEXT--------------------

- -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

ESA-2011-039: RSA, The Security Division of EMC, announces security fixes and
improvements for RSASecurID Software Token 4.1 for MicrosoftWindows

It has recently (22/11/11) come to our attention that this also affects version 
3.0 of the SecurID software.

Advisories Updated December 12, 2011

Summary:

RSA, The Security Division of EMC, announces security fixes and improvements 
for RSA SecurID Software Token 4.1 for Microsoft Windows This release 
addresses an Insecure Library Loading vulnerability within RSA SecurID 
Software Token for Windows (CVE-2011-4141). This release also provides an 
alternate installation package for customers who do not require the software 
token automation API features of the product. Further information about these
resolutions can be found in the RSA SecurID Software Token 4.1 for Microsoft 
Windows Release Notes.

Platforms:

Windows 7 Enterprise SP1 32-bit and 64-bit Windows 7 Professional SP1 32-bit 
and 64-bit Windows Vista Business SP2 32-bit and 64-bit Windows Vista 
Enterprise SP2 32-bit and 64-bit Windows XP Professional SP3

Description:

This release addresses an Insecure Library Loading vulnerability within RSA 
SecurID Software Token for Windows (CVE-2011-4141). This vulnerability may be
exploited to load arbitrary libraries by tricking a user into opening a 
Software Token file located on a compromised or malicious share. The software
token automation API enables integration with leading VPN and remote access 
applications so that users are only required to enter their usernames and 
SecurID PINs for authentication. This release provides an alternative 
installation package for customers who do not require the software token 
automation API features. Support for backwards compatibility is provided by a
separate installation package that installs the software token automation API.
Both versions of the application will be available for direct download from 
rsa.com.

Further information about these resolutions can be found in the RSA SecurID 
Software Token 4.1 for Microsoft Windows Release Notes.

Affected Products:

RSA SecurID Software Token 4.1 for Microsoft Windows

Recommendation:

RSA strongly recommends that customers upgrade to RSA SecurID Software Token 
4.1.1 for Microsoft Windows. If customers direct their end-users to download 
the application directly from rsa.com, they should update their instructions 
to ensure users download the correct version of the application.

Common Vulnerability Scoring System (CVSS) Base Score:

The Common Vulnerability Scoring System (CVSS) Base Score for CVE-2011-4141 
is: 9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C). RSA recommends that all customers take 
into account both the base score and any relevant temporal and environmental 
scores, which may impact the potential severity associated with a particular 
security vulnerability.

For more information on CVSS scoring, please see the Knowledge Base Article, 
\x{147}Security Advisories Severity Rating\x{148} at 
https://knowledge.rsasecurity.com/scolcms/knowledge.aspx?solution=a46604.

Credits:

RSA would like to thank Parvez Anwar working with Secunia (http://secunia.com)
for reporting this issue.

Obtaining Documentation:

To obtain RSA documentation, log on to RSA SecurCare Online at 
https://knowledge.rsasecurity.com and click Products in the top navigation 
menu. Select the specific product whose documentation you want to obtain. 
Scroll to the section for the product version that you want and click the set
link.

Obtaining More Information:

For more information about RSA SecurID, visit the RSA web site at 
http://www.rsa.com/node.aspx?id=1156.

Getting Support and Service:

For customers with current maintenance contracts, contact your local RSA 
Customer Support center with any additional questions regarding this RSA 
SecurCare Note. For contact telephone numbers or e-mail addresses, log on to 
RSA SecurCare Online at https://knowledge.rsasecurity.com, click Help & 
Contact, and then click the Contact Us - Phone tab or the Contact Us - Email 
tab.

General Customer Support Information:

http://www.rsa.com/node.aspx?id=1264

RSA SecurCare Online:

https://knowledge.rsasecurity.com

EOPS Policy:

RSA has a defined End of Primary Support policy associated with all major 
versions. Please refer to the link below for additional details. 
http://www.rsa.com/node.aspx?id=2575

About RSA SecurCare Notes & Security Advisories Subscription

RSA SecurCare Notes & Security Advisories are targeted e-mail messages that 
RSA sends you based on the RSA product family you currently use. If 
you\x{146}d like to stop receiving RSA SecurCare Notes & Security Advisories,
or if you\x{146}d like to change which RSA product family Notes & Security 
Advisories you currently receive, log on to RSA SecurCare Online at 
https://knowledge.rsasecurity.com/scolcms/help.aspx?_v=view3. Following the 
instructions on the page, remove the check mark next to the RSA product family
whose Notes & Security Advisories you no longer want to receive. Click the 
Submit button to save your selection.

EMC Product Security Response Center Security_Alert@EMC.com 
http://www.emc.com/contact-us/contact/product-security-response-center.htm

- -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.9 (Cygwin)

iEYEARECAAYFAk7o8uQACgkQtjd2rKp+ALz7rQCfYslXUgZW8Q4j15TMfpw88TF8 
/SUAniCSUVITIiAHaER31Zvk2zURtXAw =8bbA 
- -----END PGP SIGNATURE-----

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        http://www.auscert.org.au/render.html?cid=1980

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967

iQIVAwUBTvKDXu4yVqjM2NGpAQK+Ug/+IcZRhwTz8ijw+VCKiGdpIM0/KdQXb6nA
SBUE63vsCu8SICn/snf/fEYk9iBazXPQfEIXTzMm7UTgbjmt/E96CC/ne1h9c9Aj
LR+XolFV8GG3flwkXIbnpteU0tU59PkIAhsD6xAqqB28Sk78yiT/F8bJy7f3Pmti
uCpWslG5X9ZYpjGVzECh8fZEQ9170ExMJyrDZX6GnzbFUDO8E8rKpfwyQn6coAIn
o5yQ1sFazg6Z5RzG21OpjA3WZb/9iTbFpRbIQs1UDs9le7yUjttgqAzyArLsy6hK
lODyNU9zv6QsfFYCLZTyxczG5NlTOng1G+QORfqolxfWZ3MaX62g1I0lyB5dG33y
GLauBRCSFjMkNCkFAJuuZtJFwPXHQP42zMPWfR0KacyJFNgSdQWCsTnAyJYGT1Ka
GIe1o49gI8y9KztOPkuCniEFtHiN1bh4vwpQeneV8FIuJJHDXm6EDW9lkIVSCabU
ffGXbdIr/XN2gyZUUIqguC8pan9M4nAdzlHpmakFPHfBzlyYCMaCxNtIX9s2LPuN
51LJpheMwXM0aoodU8lLpenEOaUX01Xx/V0OVNvInOX9kQgiklaLZesDY0z7LPGD
rKH/AuwW/tkw883wkIjnHMEhsIprM6YNLSRLfY8KQeLwe961ijlgNqBjfvi+mQnn
5BHkhQyd/YQ=
=5OKE
-----END PGP SIGNATURE-----