lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <20100806164439.23659.qmail@securityfocus.com>
Date: 6 Aug 2010 16:44:39 -0000
From: security_alert@....com
To: bugtraq@...urityfocus.com
Subject: ESA-2010-013: RSA, The Security Division of EMC, informs about
 potential security vulnerability in RSA enVision® versions prior to 3.7
 SP1

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

RSA, The Security Division of EMC, informs about potential security
vulnerability in RSA enVision® versions prior 3.7 SP1

Security Advisory

Updated July 30, 2010


Summary:

RSA enVision versions prior 3.7 SP1 may contain potential denial of
service vulnerability.



Description:

CVE Identification: CVE-2010-2634

RSA enVision versions prior 3.7 SP1 may contain potential security
vulnerability due to insufficient input validation. This may be
exploited by malicious

people to cause denial of service on the affected system.



Common Vulnerability Scoring System (CVSS) Base Score:

The Common Vulnerability Scoring System (CVSS) Base Score for the items
identified in this advisory is CVSS v2 Base Score: 4
(AV:N/AC:L/Au:S/C:N/I:N/A:P)



Affected Products:

* RSA enVision versions prior 3.7 SP1


Unaffected Products:

* RSA enVision 3.7 SP1
* RSA envision 4.0


Recommendations:

This issue is already addressed in the following versions of enVision:

* RSA enVision 3.7 SP1 and later
* RSA enVision 4.0 and later

RSA strongly recommends that customers upgrade their deployment at the
earliest opportunity.



Obtaining Downloads:

To obtain the latest RSA product downloads, log on to RSA SecurCare
Online at https://knowledge.rsasecurity.com and click Products in the
top navigation

menu. Select the specific product whose download you want to obtain.
Scroll to the section for the product download that you want and click
on the link.



Credits:

RSA would like to thank Abdoul Karim Ganame for reporting this issue.



Common Vulnerability Scoring System (CVSS) Base Score:

The Common Vulnerability Scoring System (CVSS) Base Score for the items
identified in this advisory is 4 (AV:N/AC:L/Au:N/C:P/I:P/A:P) For more
information on

CVSS scoring, please see the Knowledge Base Article, "Security
Advisories Severity Rating" at
https://knowledge.rsasecurity.com/scolcms/knowledge.aspx?

solution=a46604.



Obtaining Documentation:

To obtain RSA documentation, log on to RSA SecurCare Online at
https://knowledge.rsasecurity.com and click Products in the top
navigation menu. Select the

specific product whose documentation you want to obtain. Scroll to the
section for the product version that you want and click the set link.



Obtaining More Information:

For more information about RSA enVision, visit the RSA web site at
http://www.rsa.com/node.aspx?id=3170.



Getting Support and Service:

For customers with current maintenance contracts, contact your local RSA
Customer Support center with any additional questions regarding this RSA
SecurCare

Note. For contact telephone numbers or e-mail addresses, log on to RSA
SecurCare Online at https://knowledge.rsasecurity.com, click Help &
Contact, and then

click the Contact Us - Phone tab or the Contact Us - Email tab.



General Customer Support Information:

http://www.rsa.com/node.aspx?id=1264



RSA SecurCare Online:

https://knowledge.rsasecurity.com



EOPS Policy:

RSA has a defined End of Primary Support policy associated with all
major versions. Please refer to the link below for additional details.
http://www.rsa.com/node.aspx?id=2575



SecurCare Online Security Advisories

RSA, The Security Division of EMC, distributes SCOL Security Advisories
in order to bring to the attention of users of the affected RSA products
important

security information. RSA recommends that all users determine the
applicability of this information to their individual situations and
take appropriate

action. The information set forth herein is provided "as is" without
warranty of any kind. RSA disclaim all warranties, either express or
implied, including

the warranties of merchantability, fitness for a particular purpose,
title and non-infringement. In no event shall RSA or its suppliers be
liable for any

damages whatsoever including direct, indirect, incidental,
consequential, loss of business profits or special damages, even if RSA
or its suppliers have been

advised of the possibility of such damages. Some states do not allow the
exclusion or limitation of liability for consequential or incidental
damages so the

foregoing limitation may not apply.



About RSA SecurCare Notes & Security Advisories Subscription

RSA SecurCare Notes & Security Advisories are targeted e-mail messages
that RSA sends you based on the RSA product family you currently use. If
you’d like to

stop receiving RSA SecurCare Notes & Security Advisories, or if you’d
like to change which RSA product family Notes & Security Advisories you
currently

receive, log on to RSA SecurCare Online at
https://knowledge.rsasecurity.com/scolcms/help.aspx?_v=view5. Following
the instructions on the page, remove the

check mark next to the RSA product family whose Notes & Security
Advisories you no longer want to receive. Click the Submit button to
save your selection.

EMC Product Security Response Center
Security_Alert@....com
www.emc.com/contact-us/contact/product-security-response-center.htm

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.9 (Cygwin)

iEYEARECAAYFAkxYjrcACgkQtjd2rKp+ALx3sQCcCBpwzUTmGasyIcI18RugFGx0
xigAnjQCssKArKfw9OI/4M6Mb6A8m27l
=Xmud
-----END PGP SIGNATURE-----

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ