Note:
This project will be discontinued after December 13, 2021. [more]
Product:
Bsafe_crypto\-C\-Micro\-Edition
(Dell)Repositories |
Unknown: This might be proprietary software. |
#Vulnerabilities | 18 |
Date | Id | Summary | Products | Score | Patch | Annotated |
---|---|---|---|---|---|---|
2024-02-02 | CVE-2020-29504 | Dell BSAFE Crypto-C Micro Edition, versions before 4.1.5, and Dell BSAFE Micro Edition Suite, versions before 4.5.2, contain a Missing Required Cryptographic Step Vulnerability. | Bsafe_crypto\-C\-Micro\-Edition, Bsafe_micro\-Edition\-Suite | 9.8 | ||
2024-07-31 | CVE-2023-28074 | Dell BSAFE Crypto-C Micro Edition, version 4.1.5, and Dell BSAFE Micro Edition Suite, versions 4.0 through 4.6.1 and version 5.0, contains an Out-of-bounds Read vulnerability. An unauthenticated attacker with local access could potentially exploit this vulnerability, leading to Information exposure. | Bsafe_crypto\-C\-Micro\-Edition, Bsafe_micro\-Edition\-Suite | 7.1 | ||
2013-10-11 | CVE-2007-6755 | The NIST SP 800-90A default statement of the Dual Elliptic Curve Deterministic Random Bit Generation (Dual_EC_DRBG) algorithm contains point Q constants with a possible relationship to certain "skeleton key" values, which might allow context-dependent attackers to defeat cryptographic protection mechanisms by leveraging knowledge of those values. NOTE: this is a preliminary CVE for Dual_EC_DRBG; future research may provide additional details about point Q and associated attacks, and could... | Bsafe_crypto\-C\-Micro\-Edition, Bsafe_crypto\-J | N/A | ||
2019-09-30 | CVE-2019-3731 | RSA BSAFE Crypto-C Micro Edition versions prior to 4.1.4 and RSA Micro Edition Suite versions prior to 4.4 are vulnerable to an Information Exposure Through Timing Discrepancy. A malicious remote user could potentially exploit this vulnerability to extract information leaving data at risk of exposure. | Bsafe_crypto\-C\-Micro\-Edition, Bsafe_micro\-Edition\-Suite | 7.5 | ||
2019-09-30 | CVE-2019-3732 | RSA BSAFE Crypto-C Micro Edition, versions prior to 4.0.5.3 (in 4.0.x) and versions prior to 4.1.3.3 (in 4.1.x), and RSA Micro Edition Suite, versions prior to 4.0.11 (in 4.0.x) versions prior to 4.1.6.1 (in 4.1.x) and versions prior to 4.3.3 (4.2.x and 4.3.x) are vulnerable to an Information Exposure Through Timing Discrepancy. A malicious remote user could potentially exploit this vulnerability to extract information leaving data at risk of exposure. | Bsafe_crypto\-C\-Micro\-Edition, Bsafe_micro\-Edition\-Suite, Rsa_bsafe_crypto\-C | 7.5 | ||
2019-09-30 | CVE-2019-3733 | RSA BSAFE Crypto-C Micro Edition, all versions prior to 4.1.4, is vulnerable to three (3) different Improper Clearing of Heap Memory Before Release vulnerability, also known as 'Heap Inspection vulnerability'. A malicious remote user could potentially exploit this vulnerability to extract information leaving data at risk of exposure. | Bsafe_crypto\-C\-Micro\-Edition, Rsa_bsafe_crypto\-C | 4.9 | ||
2019-09-30 | CVE-2019-3728 | RSA BSAFE Crypto-C Micro Edition versions prior to 4.0.5.4 (in 4.0.x) and 4.1.4 (in 4.1.x) and RSA BSAFE Micro Edition Suite versions prior to 4.0.13 (in 4.0.x) and prior to 4.4 (in 4.1.x, 4.2.x, 4.3.x) are vulnerable to a Buffer Over-read vulnerability when processing DSA signature. A malicious remote user could potentially exploit this vulnerability to cause a crash in the library of the affected system. | Bsafe_crypto\-C\-Micro\-Edition, Bsafe_micro\-Edition\-Suite | 7.5 | ||
2016-04-12 | CVE-2016-0887 | EMC RSA BSAFE Micro Edition Suite (MES) 4.0.x and 4.1.x before 4.1.5, RSA BSAFE Crypto-C Micro Edition (CCME) 4.0.x and 4.1.x before 4.1.3, RSA BSAFE Crypto-J before 6.2.1, RSA BSAFE SSL-J before 6.2.1, and RSA BSAFE SSL-C before 2.8.9 allow remote attackers to discover a private-key prime by conducting a Lenstra side-channel attack that leverages an application's failure to detect an RSA signature failure during a TLS session. | Bsafe_crypto\-C\-Micro\-Edition, Bsafe_crypto\-J, Bsafe_micro\-Edition\-Suite, Bsafe_ssl\-C, Bsafe_ssl\-J | 5.9 |