RSA Authentication Manager CVE-2016-0800 "DROWN" Vulnerability - False Positive
Originally Published: 2016-03-02
Article Number
Applies To
RSA Authentication Manager 7.1.4 / 3.0.4
CVE Identifier(s)
Article Summary
And related vulnerabilities:
CVE-2016-0705, CVE-2016-0798, CVE-2016-0797, CVE-2016-0799, CVE-2016-0703, CVE-2016-0704
Link to Advisories
Alert Impact
Not Applicable
Alert Impact Explanation
A cross-protocol attack was discovered that could lead to decryption of TLS
sessions by using a server supporting SSLv2 and EXPORT cipher suites as a
Bleichenbacher RSA padding oracle. Note that traffic between clients and
non-vulnerable servers can be decrypted provided another server supporting
SSLv2 and EXPORT ciphers (even with a different protocol such as SMTP, IMAP or
POP) shares the RSA keys of the non-vulnerable server. This vulnerability is
known as DROWN (CVE-2016-0800).
Recovering one session key requires the attacker to perform approximately 2^50
computation, as well as thousands of connections to the affected server. A more
efficient variant of the DROWN attack exists against unpatched OpenSSL servers
using versions that predate 1.0.2a, 1.0.1m, 1.0.0r and 0.9.8zf released on
19/Mar/2015 (see CVE-2016-0703).
Users can avoid this issue by disabling the SSLv2 protocol in all their SSL/TLS
servers, if they've not done so already. Disabling all SSLv2 ciphers is also
sufficient, provided the patches for CVE-2015-3197 (fixed in OpenSSL 1.0.1r and
1.0.2f) have been deployed. Servers that have not disabled the SSLv2 protocol,
and are not patched for CVE-2015-3197 are vulnerable to DROWN even if all SSLv2
ciphers are nominally disabled, because malicious clients can force the use of
SSLv2 with EXPORT ciphers.
Resolution
Notes
Upgraded OpenSSL to openssl-0.9.8j-0.89.1 in Third Party Patch v2 as per https://www.suse.com/security/cve/CVE-2016-0800.html
To confirm:
~> rpm -qa | grep openssl libopenssl0_9_8-0.9.8j-0.89.1 openssl-0.9.8j-0.89.1
Disclaimer
Related Articles
Failing to access Identity Router IDR Web resource after IDR v2.17 update 108Number of Views Remote AFX Server does not start, there is a SocketException in esb.AFX_INIT.log, and OpenSSL cannot complete an SSL Hands… 323Number of Views Monitor Uptime Status for Cloud Access Service 133Number of Views Getting Started with FIDO 415Number of Views How to add language localization to forms in RSA Identity Governance & Lifecycle 72Number of Views
Trending Articles
How to recover the Application and AFX after an unexpected database failure in RSA Identity Governance & Lifecycle Troubleshooting AFX Connector issues in RSA Identity Governance & Lifecycle RSA MFA Agent 2.3.6 for Microsoft Windows Installation and Administration Guide RSA Release Notes for RSA Authentication Manager 8.8 RSA Authentication Manager 8.9 Release Notes (January 2026)
Don't see what you're looking for?