| Title | RSA BSAFE Micro Edition Suite および Crypto-C Micro Edition における境界外読み取りに関する脆弱性 |
|---|---|
| Summary | RSA BSAFE Micro Edition Suite および Crypto-C Micro Edition には、境界外読み取りに関する脆弱性が存在します。 |
| Possible impacts | 情報を取得される、情報を改ざんされる、およびサービス運用妨害 (DoS) 状態にされる可能性があります。 |
| Solution | ベンダ情報および参考情報を参照して適切な対策を実施してください。 |
| Publication Date | Aug. 28, 2018, midnight |
| Registration Date | Dec. 17, 2018, 12:26 p.m. |
| Last Update | Dec. 17, 2018, 12:26 p.m. |
| CVSS3.0 : 緊急 | |
| Score | 9.8 |
|---|---|
| Vector | CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H |
| CVSS2.0 : 危険 | |
| Score | 7.5 |
|---|---|
| Vector | AV:N/AC:L/Au:N/C:P/I:P/A:P |
| DELL EMC (旧 EMC Corporation) |
| RSA BSAFE 4.0.11 未満の 4.0.x |
| RSA BSAFE 4.1.6 未満の 4.1.x |
| RSA BSAFE Crypto-C 4.0.5.3 未満の 4.0.x |
| No | Changed Details | Date of change |
|---|---|---|
| 1 | [2018年12月17日] 掲載 |
Dec. 17, 2018, 12:26 p.m. |
| Summary | RSA BSAFE Micro Edition Suite, versions prior to 4.0.11 (in 4.0.x) and prior to 4.1.6 (in 4.1.x), and RSA BSAFE Crypto-C Micro Edition, version prior to 4.0.5.3 (in 4.0.x) contain a Buffer Over-Read vulnerability when parsing ASN.1 data. A remote attacker could use maliciously constructed ASN.1 data that would result in such issue. |
|---|---|
| Publication Date | Sept. 15, 2018, 5:29 a.m. |
| Registration Date | March 1, 2021, 6:44 p.m. |
| Last Update | Nov. 21, 2024, 12:42 p.m. |
| Configuration1 | or higher | or less | more than | less than | |
| cpe:2.3:a:dell:bsafe:*:*:*:*:micro_edition_suite:*:*:* | 4.0.0 | 4.0.11 | |||
| cpe:2.3:a:dell:bsafe:*:*:*:*:micro_edition_suite:*:*:* | 4.1.0 | 4.1.6 | |||
| cpe:2.3:a:dell:bsafe_crypto-c:*:*:*:*:micro:*:*:* | 4.0.0 | 4.0.5.3 | |||
| Configuration2 | or higher | or less | more than | less than | |
| cpe:2.3:a:oracle:jd_edwards_enterpriseone_tools:9.2:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:oracle:security_service:12.1.3.0.0:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:oracle:enterprise_manager_ops_center:12.3.3:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:oracle:security_service:11.1.1.9.0:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:oracle:security_service:12.2.1.3.0:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:oracle:application_testing_suite:13.3.0.1:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:oracle:retail_predictive_application_server:15.0.3:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:oracle:enterprise_manager_ops_center:12.4.0:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:oracle:communications_ip_service_activator:7.4.0:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:oracle:communications_ip_service_activator:7.3.0:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:oracle:core_rdbms:11.2.0.4:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:oracle:core_rdbms:12.2.0.1:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:oracle:core_rdbms:12.1.0.2:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:oracle:core_rdbms:19c:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:oracle:core_rdbms:18c:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:oracle:retail_predictive_application_server:16.0.3.0:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:oracle:goldengate_application_adapters:12.3.2.1.0:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:oracle:communications_analytics:12.1.1:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:oracle:real_user_experience_insight:13.3.1.0:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:oracle:real_user_experience_insight:13.1.2.1:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:oracle:real_user_experience_insight:13.2.3.1:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:oracle:timesten_in-memory_database:*:*:*:*:*:*:*:* | 18.1.4.1.0 | ||||