RSA BSAFE Micro Edition Suite, versions prior to 4.0.11 (in 4.0.x) and prior to 4.1.6 (in 4.1.x), and RSA BSAFE Crypto-C Micro Edition, version prior to 4.0.5.3 (in 4.0.x) contain a Buffer Over-Read vulnerability when parsing ASN.1 data. A remote attacker could use maliciously constructed ASN.1 data that would result in such issue.
References
Link | Resource |
---|---|
http://seclists.org/fulldisclosure/2018/Aug/46 | Mailing List Third Party Advisory |
http://www.securityfocus.com/bid/108106 | Broken Link |
https://www.oracle.com/security-alerts/cpuapr2020.html | Patch Third Party Advisory |
https://www.oracle.com/security-alerts/cpujan2020.html | Patch Third Party Advisory |
https://www.oracle.com/security-alerts/cpujul2020.html | Patch Third Party Advisory |
https://www.oracle.com/security-alerts/cpuoct2020.html | Patch Third Party Advisory |
https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html | Patch Third Party Advisory |
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
History
18 Apr 2022, 18:12
Type | Values Removed | Values Added |
---|---|---|
References | (N/A) https://www.oracle.com/security-alerts/cpuapr2020.html - Patch, Third Party Advisory | |
References | (MISC) https://www.oracle.com/security-alerts/cpujul2020.html - Patch, Third Party Advisory | |
References | (MISC) https://www.oracle.com/security-alerts/cpujan2020.html - Patch, Third Party Advisory | |
References | (BID) http://www.securityfocus.com/bid/108106 - Broken Link | |
References | (MISC) https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html - Patch, Third Party Advisory | |
References | (MISC) https://www.oracle.com/security-alerts/cpuoct2020.html - Patch, Third Party Advisory | |
CPE | cpe:2.3:a:oracle:communications_ip_service_activator:7.4.0:*:*:*:*:*:*:* cpe:2.3:a:oracle:core_rdbms:19c:*:*:*:*:*:*:* cpe:2.3:a:oracle:core_rdbms:12.1.0.2:*:*:*:*:*:*:* cpe:2.3:a:oracle:enterprise_manager_ops_center:12.3.3:*:*:*:*:*:*:* cpe:2.3:a:oracle:core_rdbms:18c:*:*:*:*:*:*:* cpe:2.3:a:oracle:enterprise_manager_ops_center:12.4.0:*:*:*:*:*:*:* cpe:2.3:a:oracle:jd_edwards_enterpriseone_tools:9.2:*:*:*:*:*:*:* cpe:2.3:a:oracle:communications_analytics:12.1.1:*:*:*:*:*:*:* cpe:2.3:a:oracle:timesten_in-memory_database:*:*:*:*:*:*:*:* cpe:2.3:a:oracle:security_service:11.1.1.9.0:*:*:*:*:*:*:* cpe:2.3:a:oracle:real_user_experience_insight:13.3.1.0:*:*:*:*:*:*:* cpe:2.3:a:oracle:retail_predictive_application_server:16.0.3.0:*:*:*:*:*:*:* cpe:2.3:a:oracle:core_rdbms:11.2.0.4:*:*:*:*:*:*:* cpe:2.3:a:oracle:application_testing_suite:13.3.0.1:*:*:*:*:*:*:* cpe:2.3:a:oracle:real_user_experience_insight:13.1.2.1:*:*:*:*:*:*:* cpe:2.3:a:oracle:core_rdbms:12.2.0.1:*:*:*:*:*:*:* cpe:2.3:a:oracle:goldengate_application_adapters:12.3.2.1.0:*:*:*:*:*:*:* cpe:2.3:a:oracle:retail_predictive_application_server:15.0.3:*:*:*:*:*:*:* cpe:2.3:a:oracle:real_user_experience_insight:13.2.3.1:*:*:*:*:*:*:* cpe:2.3:a:oracle:security_service:12.1.3.0.0:*:*:*:*:*:*:* cpe:2.3:a:oracle:communications_ip_service_activator:7.3.0:*:*:*:*:*:*:* cpe:2.3:a:oracle:security_service:12.2.1.3.0:*:*:*:*:*:*:* |
30 Nov 2021, 18:50
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:emc:rsa_bsafe:*:*:*:*:micro_edition_suite:*:*:* |
cpe:2.3:a:dell:bsafe:*:*:*:*:micro_edition_suite:*:*:* cpe:2.3:a:dell:bsafe_crypto-c:*:*:*:*:micro:*:*:* |
Information
Published : 2018-09-14 20:29
Updated : 2024-02-04 20:03
NVD link : CVE-2018-11058
Mitre link : CVE-2018-11058
CVE.ORG link : CVE-2018-11058
JSON object : View
Products Affected
oracle
- jd_edwards_enterpriseone_tools
- communications_analytics
- application_testing_suite
- core_rdbms
- goldengate_application_adapters
- timesten_in-memory_database
- security_service
- retail_predictive_application_server
- communications_ip_service_activator
- enterprise_manager_ops_center
- real_user_experience_insight
dell
- bsafe
- bsafe_crypto-c
CWE
CWE-125
Out-of-bounds Read