Vulnerability Name: | CVE-2018-11055 (CCN-149082) | ||||||||||||
Assigned: | 2018-08-28 | ||||||||||||
Published: | 2018-08-28 | ||||||||||||
Updated: | 2022-04-18 | ||||||||||||
Summary: | RSA BSAFE Micro Edition Suite, versions prior to 4.0.11 (in 4.0.x) and prior to 4.1.6.1 (in 4.1.x), contains an Improper Clearing of Heap Memory Before Release ('Heap Inspection') vulnerability. Decoded PKCS #12 data in heap memory is not zeroized by MES before releasing the memory internally and a malicious local user could gain access to the unauthorized data by doing heap inspection. | ||||||||||||
CVSS v3 Severity: | 5.5 Medium (CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N) 4.8 Medium (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C)
3.9 Low (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C)
| ||||||||||||
CVSS v2 Severity: | 2.1 Low (CVSS v2 Vector: AV:L/AC:L/Au:N/C:P/I:N/A:N)
| ||||||||||||
Vulnerability Type: | CWE-404 | ||||||||||||
Vulnerability Consequences: | Obtain Information | ||||||||||||
References: | Source: MITRE Type: CNA CVE-2018-11055 Source: CCN Type: Dell EMC Identifier: DSA-2018-128 RSA BSAFE Micro Edition Suite and Crypto-C Micro Edition Multiple Security Vulnerabilities Source: FULLDISC Type: Mailing List, Third Party Advisory 20180828 DSA-2018-128: RSA BSAFE Micro Edition Suite and Crypto-C Micro Edition Multiple Security Vulnerabilities Source: XF Type: UNKNOWN rsa-bsafe-cve201811055-info-disc(149082) Source: N/A Type: Patch, Third Party Advisory N/A Source: MISC Type: Patch, Third Party Advisory https://www.oracle.com/security-alerts/cpujan2020.html Source: MISC Type: Patch, Third Party Advisory https://www.oracle.com/security-alerts/cpujul2020.html Source: MISC Type: Patch, Third Party Advisory https://www.oracle.com/security-alerts/cpuoct2020.html Source: MISC Type: Patch, Third Party Advisory https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html | ||||||||||||
Vulnerable Configuration: | Configuration 1: Configuration 2: Denotes that component is vulnerable | ||||||||||||
BACK |