RSA Certificate Manager security vulnerabilities for Apache - False Positives (CVE-2011-3368 / CVE-2012-0053 / CVE-2013-1862 / CVE-2014-0118)
Originally Published: 2015-05-05
Article Number
Applies To
CVE Identifier(s)
Article Summary
Link to Advisories
CVE-2012-0053: https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2012-0053
CVE-2013-1862: https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2013-1862
CVE-2014-0118: https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-0118
Alert Impact
Not Applicable
Alert Impact Explanation
The mod_proxy module in the Apache HTTP Server 1.3.x through 1.3.42, 2.0.x through 2.0.64, and 2.2.x through 2.2.21 does not properly interact with use of RewriteRule and ProxyPassMatch pattern matches for configuration of a reverse proxy, which allows remote attackers to send requests to intranet servers via a malformed URI containing an initial @ (at sign) character.
This issue is not applicable to RSA Certificate Manager. RCM does not use mod_proxy module.
2) CVE-2012-0053:
protocol.c in the Apache HTTP Server 2.2.x through 2.2.21 does not properly restrict header information during construction of Bad Request (aka 400) error documents, which allows remote attackers to obtain the values of HTTPOnly cookies via vectors involving a long or malformed header in conjunction with crafted web script.
This issue was fixed in RSA Certificate Manager 6.9 build 551. Refer to RCM 6.9 build 558 release notes.
3) CVE-2013-1862:
mod_rewrite.c in the mod_rewrite module in the Apache HTTP Server 2.2.x before 2.2.25 writes data to a log file without sanitizing non-printable characters, which might allow remote attackers to execute arbitrary commands via an HTTP request containing an escape sequence for a terminal emulator.
This issue was fixed in RSA Certificate Manager 6.9 build 556. Refer to RCM 6.9 build 558 release notes.
4) CVE-2014-0118:
The deflate_in_filter function in mod_deflate.c in the mod_deflate module in the Apache HTTP Server before 2.4.10, when request body decompression is enabled, allows remote attackers to cause a denial of service (resource consumption) via crafted request data that decompresses to a much larger size.
This issue is not applicable to RSA Certificate Manager. RCM does not use mod_deflate module.
Disclaimer
Related Articles
Do RSA SmartIDs / Smart Cards support 2048-bit key certificates? 14Number of Views RSA Authentication Manager 8.2 Multiple OpenSSL Vulnerabilities - False Positive 68Number of Views RSA Authentication Manager 8.2 Multiple Vulnerabilities - False Positive 58Number of Views Apache Common Library InvokerTransformer Vulnerability (CVE-2015-4852 & CVE-2015-6420) in RSA Access Manager 6.x - False P… 44Number of Views OpenSSL Heartbeat Vulnerability (Heartbleed) in RSA products 325Number of Views
Trending Articles
Passwordless Authentication in Windows MFA Agent for Active Directory – Quick Setup Guide RSA Authentication Manager 8.9 Release Notes (January 2026) RSA Authentication Manager Upgrade Process RSA Authentication Manager 8.7 SP2 Setup and Configuration Guide An example of SSO using SAML and ADFS with RSA Identity Management and Governance 6.9.x
Don't see what you're looking for?