NIAP: Assurance Continuity
NIAP/CCEVS
  NIAP  »»  Product Compliant List  »»  Product Entry  »»  Assurance Continuity  
Assurance Continuity - Red Hat Certificate System 9.4 batch update 3

Date of Maintenance Completion:  2021.03.31

Product Type:    Certificate Authority

Conformance Claim:  Protection Profile Compliant

PP Identifier:    Protection Profile for Certification Authorities Version 2.1

Original Evaluated TOE:  2019.04.09 - Red Hat Certificate System 9.4

CC Certificate [PDF] Validation Report [PDF] Assurance Activity [PDF]

Administrative Guide [PDF]

Installation Guide [PDF]

Please note:  The above files are for the Original Evaluated TOE.  Consequently, they do not refer to this maintained version, although they apply to the maintained version. 

Security Target [PDF] * Assurance Continuity Maintenance Report [PDF] Administrative Guide [PDF]

Administrative Guide [PDF]

Please note:  This serves as an addendum to the VR for the Original Evaluated TOE. 

* This is the Security Target (ST) associated with this latest Maintenance Release.  To view previous STs for this TOE, click here.

Readers are reminded that the certification of this product (TOE) is the result of maintenance, rather than an actual re-evaluation of the product.  Maintenance only considers the affect of TOE changes on the assurance baseline (i.e. the original evaluated TOE); maintenance is not intended to provide assurance in regard to the resistance of the TOE to new vulnerabilities or attack methods discovered since the date of the initial certificate.  Such assurance can only be gained through re-evaluation. 

Using a security impact analysis of the changes made to the TOE, which was provided by the developer, the CCEVS has determined that the impact of changes on the TOE are considered minor and that independent evaluator analysis was not necessary.  A summary of the results can be found in the Maintenance Report, which is written in relation to the product's original validation report and Security Target.  Readers are therefore reminded to read the Security Target, Validation Report, and the Assurance Maintenance Report to fully understand the meaning of what a maintained certificate represents. 

Product Description

The only differences in the TOE software were the application of security patches.  No changes were made to the TOE hardware. The documentation has been updated to reflect the software update version, the Security Target, Administration Guide and Planning, Installation and Deployment Guide.

TOE new features:

Feature

Description

N/A

No new features were added.


TOE changes to existing functionality:

Feature

Description

N/A

No changes to TOE.


TOE security patches:

Security patches were applied to the TOE and they are the only reported changes to the TOE. The patches addressed publicly reported vulnerabilities and defects. The security updates were found to have no impact to the security functionality of the TOE.

The following table provides a brief description of the security patches and the concerned CVEs.

CVE

Description of change

CVE-2019-10180: A vulnerability was found in all pki-core 10.x.x version, where the Token Processing Service (TPS) did not properly sanitize several parameters stored for the tokens, possibly resulting in a Stored Cross Site Scripting (XSS) vulnerability.

Added input validation for TPS

 

CVE-2020-1696: A flaw was found in the all pki-core 10.x.x versions, where Token Processing Service (TPS) where it did not properly sanitize Profile IDs, enabling a Stored Cross-Site Scripting (XSS) vulnerability when the profile ID is printed.

Same fix in CVE-2019-10180 addressed this issue

CVE-2019-10221: A Reflected Cross Site Scripting vulnerability was found in all pki-core 10.x.x versions, where the pki-ca module from the pki-core server.

Sanitized the Server generated error message to escape the HTML tags with URLs if any present

CVE-2019-10179: A vulnerability was found in all pki-core 10.x.x versions, where the Key Recovery Authority (KRA) Agent Service did not properly sanitize recovery request search page, enabling a Reflected Cross Site Scripting (XSS) vulnerability.

Same fix in CVE-2019-10180 addressed this issue

CVE-2019-10146: A Reflected Cross Site Scripting flaw was found in all pki-core 10.x.x versions module from the pki-core server due to the CA Agent Service not properly sanitizing the certificate request page.

The  XSS is addressed  in PathLength attribute in CA agent web page
- The input type is set to number when "integer" is encountered
- The server error message is html escaped, before it gets displayed in client browser

 

 

CVE-2019-17007: In Network Security Services before 3.44, a malformed Netscape Certificate Sequence can cause NSS to crash, resulting in a denial of service.

Add a check that we decode a certificate sequence correctly before actually using it. Any anomalies in the cert sequence are reported as errors

CVE-2019-17006: In Network Security Services (NSS) before 3.46, several cryptographic primitives had missing length checks.

Added additional length checks around cryptographic primitives to make sure each primitive affected receives sane input values, adhering to rfc specs. If errors are detected, abort the given operation with an error

Vendor Information

Logo
Red Hat, Inc.
Christina Fu
+16502544223
cfu@redhat.com

https://www.redhat.com
Site Map              Contact Us              Home