RSA Identity Governance & Lifecycle Capacity Overflow Attack Vulnerability
Originally Published: 2018-04-12
Article Number
Applies To
| RSA Product Name | Versions | Platforms |
|---|---|---|
| RSA Identity Governance & Lifecycle | 7.1 | RSA hardware appliance Virtual application (OVA) with RSA-provided database Virtual application (OVA) with customer-supplied database |
| RSA Identity Governance & Lifecycle | 7.0.2 7.0.1 | RSA hardware appliance |
| RSA Via Lifecycle & Governance | 7.0 | RSA hardware appliance |
Article Summary
Alert Impact
Impacted - Apply RSA Remedy
Alert Impact Explanation
Resolution
The following steps can be taken to automatically bind /var/tmp to /tmp at system boot time.
- Log in to the appliance using root
- Search /etc/fstab to check that /var/tmp is not already bound to another directory. Issue the following command:
grep /var/tmp /etc/fstab
If the grep command returns no output, or returns only lines that do not "bind" /var/tmp, continue with step 3 below.
If the grep command returns an error, or finds a line that "binds" /var/tmp, do not continue.
If the grep command returns an error, or finds a line that "binds" /var/tmp, do not continue.
- Use the commands below to backup the current /etc/fstab file. Each command should return no output and no errors:
mkdir /tmp/ACM-83001-backup cp /etc/fstab /tmp/ACM-83001-backup
- Use the following command to add a line to file /etc/fstab to mount /tmp to /var/tmp. The command should return no output and no errors.
echo "/tmp /var/tmp none bind 0 0" >> /etc/fstab
- Check that file /etc/fstab has been modified correctly by typing the command:
cat /etc/fstab
The cat command should show that the last line in /etc/fstab is now:
/tmp /var/tmp none bind 0 0
- Reboot the appliance.
Notes
Reboot Required
A reboot is required to perform the mount because there are many lock files and communication-related temporary files maintained in /var/tmp. Running an explicit mount command in a running system may lead to issues when a local Oracle database is in use.Backout
Should this change need to be backed out, the original /etc/fstab file can be copied from the backup directory to its original location with the following command:cp /tmp/ACM-83001-backup/fstab /etc
Disclaimer
Related Articles
Security scan shows a possible denial of service vulnerability 26Number of Views RSA Authentication Manager 8.x Heap-Based Buffer Overflow in libarchive - CVE-2016-1541 - False Positive 26Number of Views Tenable Vulnerability Management - SAML Relying Party Configuration - RSA Ready Implementation Guide 20Number of Views SUDO Vulnerability - CVE-2021-3156 in RSA Authentication Manager 8.5 P2 70Number of Views Tenable Vulnerability Management - RSA Ready Implementation Guide 37Number of Views
Trending Articles
RSA MFA Agent 2.5 for Microsoft Windows Installation and Administration Guide RSA Authentication Manager 8.9 Release Notes (January 2026) User Event Monitor Messages for Cloud Access Service (1501 - 20406) How to test RSA Identity Router (IDR) Secure Connector connectivity to the RSA ID Plus Cloud Access Service RSA Release Notes for RSA Authentication Manager 8.8
Don't see what you're looking for?