ID CVE-2018-15769
Summary RSA BSAFE Micro Edition Suite versions prior to 4.0.11 (in 4.0.x series) and versions prior to 4.1.6.2 (in 4.1.x series) contain a key management error issue. A malicious TLS server could potentially cause a Denial Of Service (DoS) on TLS clients during the handshake when a very large prime value is sent to the TLS client, and an Ephemeral or Anonymous Diffie-Hellman cipher suite (DHE or ADH) is used.
References
Vulnerable Configurations
  • cpe:2.3:a:dell:bsafe:4.0.0:*:*:*:micro_edition_suite:*:*:*
    cpe:2.3:a:dell:bsafe:4.0.0:*:*:*:micro_edition_suite:*:*:*
  • cpe:2.3:a:dell:bsafe:4.0.1:*:*:*:micro_edition_suite:*:*:*
    cpe:2.3:a:dell:bsafe:4.0.1:*:*:*:micro_edition_suite:*:*:*
  • cpe:2.3:a:dell:bsafe:4.0.2:*:*:*:micro_edition_suite:*:*:*
    cpe:2.3:a:dell:bsafe:4.0.2:*:*:*:micro_edition_suite:*:*:*
  • cpe:2.3:a:dell:bsafe:4.0.3:*:*:*:micro_edition_suite:*:*:*
    cpe:2.3:a:dell:bsafe:4.0.3:*:*:*:micro_edition_suite:*:*:*
  • cpe:2.3:a:dell:bsafe:4.0.4:*:*:*:micro_edition_suite:*:*:*
    cpe:2.3:a:dell:bsafe:4.0.4:*:*:*:micro_edition_suite:*:*:*
  • cpe:2.3:a:dell:bsafe:4.0.5:*:*:*:micro_edition_suite:*:*:*
    cpe:2.3:a:dell:bsafe:4.0.5:*:*:*:micro_edition_suite:*:*:*
  • cpe:2.3:a:dell:bsafe:4.0.5.3:*:*:*:micro_edition_suite:*:*:*
    cpe:2.3:a:dell:bsafe:4.0.5.3:*:*:*:micro_edition_suite:*:*:*
  • cpe:2.3:a:dell:bsafe:4.0.7:*:*:*:micro_edition_suite:*:*:*
    cpe:2.3:a:dell:bsafe:4.0.7:*:*:*:micro_edition_suite:*:*:*
  • cpe:2.3:a:dell:bsafe:4.0.8:*:*:*:micro_edition_suite:*:*:*
    cpe:2.3:a:dell:bsafe:4.0.8:*:*:*:micro_edition_suite:*:*:*
  • cpe:2.3:a:dell:bsafe:4.0.9:*:*:*:micro_edition_suite:*:*:*
    cpe:2.3:a:dell:bsafe:4.0.9:*:*:*:micro_edition_suite:*:*:*
  • cpe:2.3:a:dell:bsafe:4.0.10:*:*:*:micro_edition_suite:*:*:*
    cpe:2.3:a:dell:bsafe:4.0.10:*:*:*:micro_edition_suite:*:*:*
  • cpe:2.3:a:dell:bsafe:4.1.0:*:*:*:micro_edition_suite:*:*:*
    cpe:2.3:a:dell:bsafe:4.1.0:*:*:*:micro_edition_suite:*:*:*
  • cpe:2.3:a:dell:bsafe:4.1.0.1:*:*:*:micro_edition_suite:*:*:*
    cpe:2.3:a:dell:bsafe:4.1.0.1:*:*:*:micro_edition_suite:*:*:*
  • cpe:2.3:a:dell:bsafe:4.1.1:*:*:*:micro_edition_suite:*:*:*
    cpe:2.3:a:dell:bsafe:4.1.1:*:*:*:micro_edition_suite:*:*:*
  • cpe:2.3:a:dell:bsafe:4.1.2:*:*:*:micro_edition_suite:*:*:*
    cpe:2.3:a:dell:bsafe:4.1.2:*:*:*:micro_edition_suite:*:*:*
  • cpe:2.3:a:dell:bsafe:4.1.3:*:*:*:micro_edition_suite:*:*:*
    cpe:2.3:a:dell:bsafe:4.1.3:*:*:*:micro_edition_suite:*:*:*
  • cpe:2.3:a:dell:bsafe:4.1.4:*:*:*:micro_edition_suite:*:*:*
    cpe:2.3:a:dell:bsafe:4.1.4:*:*:*:micro_edition_suite:*:*:*
  • cpe:2.3:a:dell:bsafe:4.1.5:*:*:*:micro_edition_suite:*:*:*
    cpe:2.3:a:dell:bsafe:4.1.5:*:*:*:micro_edition_suite:*:*:*
  • cpe:2.3:a:dell:bsafe:4.1.6:*:*:*:micro_edition_suite:*:*:*
    cpe:2.3:a:dell:bsafe:4.1.6:*:*:*:micro_edition_suite:*:*:*
  • cpe:2.3:a:dell:bsafe:4.1.6.1:*:*:*:micro_edition_suite:*:*:*
    cpe:2.3:a:dell:bsafe:4.1.6.1:*:*:*:micro_edition_suite:*:*:*
  • cpe:2.3:a:oracle:application_testing_suite:13.3.0.1:*:*:*:*:*:*:*
    cpe:2.3:a:oracle:application_testing_suite:13.3.0.1:*:*:*:*:*:*:*
  • cpe:2.3:a:oracle:communications_analytics:12.1.1:*:*:*:*:*:*:*
    cpe:2.3:a:oracle:communications_analytics:12.1.1:*:*:*:*:*:*:*
  • cpe:2.3:a:oracle:communications_ip_service_activator:7.3.0:*:*:*:*:*:*:*
    cpe:2.3:a:oracle:communications_ip_service_activator:7.3.0:*:*:*:*:*:*:*
  • cpe:2.3:a:oracle:communications_ip_service_activator:7.4.0:*:*:*:*:*:*:*
    cpe:2.3:a:oracle:communications_ip_service_activator:7.4.0:*:*:*:*:*:*:*
  • cpe:2.3:a:oracle:core_rdbms:11.2.0.4:*:*:*:*:*:*:*
    cpe:2.3:a:oracle:core_rdbms:11.2.0.4:*:*:*:*:*:*:*
  • cpe:2.3:a:oracle:core_rdbms:12.1.0.2:*:*:*:*:*:*:*
    cpe:2.3:a:oracle:core_rdbms:12.1.0.2:*:*:*:*:*:*:*
  • cpe:2.3:a:oracle:core_rdbms:12.2.0.1:*:*:*:*:*:*:*
    cpe:2.3:a:oracle:core_rdbms:12.2.0.1:*:*:*:*:*:*:*
  • cpe:2.3:a:oracle:core_rdbms:18c:*:*:*:*:*:*:*
    cpe:2.3:a:oracle:core_rdbms:18c:*:*:*:*:*:*:*
  • cpe:2.3:a:oracle:core_rdbms:19c:*:*:*:*:*:*:*
    cpe:2.3:a:oracle:core_rdbms:19c:*:*:*:*:*:*:*
  • cpe:2.3:a:oracle:enterprise_manager_ops_center:12.3.3:*:*:*:*:*:*:*
    cpe:2.3:a:oracle:enterprise_manager_ops_center:12.3.3:*:*:*:*:*:*:*
  • cpe:2.3:a:oracle:enterprise_manager_ops_center:12.4.0:*:*:*:*:*:*:*
    cpe:2.3:a:oracle:enterprise_manager_ops_center:12.4.0:*:*:*:*:*:*:*
  • cpe:2.3:a:oracle:goldengate_application_adapters:12.3.2.1.0:*:*:*:*:*:*:*
    cpe:2.3:a:oracle:goldengate_application_adapters:12.3.2.1.0:*:*:*:*:*:*:*
  • cpe:2.3:a:oracle:jd_edwards_enterpriseone_tools:9.2:*:*:*:*:*:*:*
    cpe:2.3:a:oracle:jd_edwards_enterpriseone_tools:9.2:*:*:*:*:*:*:*
  • cpe:2.3:a:oracle:real_user_experience_insight:13.1.2.1:*:*:*:*:*:*:*
    cpe:2.3:a:oracle:real_user_experience_insight:13.1.2.1:*:*:*:*:*:*:*
  • cpe:2.3:a:oracle:real_user_experience_insight:13.2.3.1:*:*:*:*:*:*:*
    cpe:2.3:a:oracle:real_user_experience_insight:13.2.3.1:*:*:*:*:*:*:*
  • cpe:2.3:a:oracle:real_user_experience_insight:13.3.1.0:*:*:*:*:*:*:*
    cpe:2.3:a:oracle:real_user_experience_insight:13.3.1.0:*:*:*:*:*:*:*
  • cpe:2.3:a:oracle:retail_predictive_application_server:15.0.3:*:*:*:*:*:*:*
    cpe:2.3:a:oracle:retail_predictive_application_server:15.0.3:*:*:*:*:*:*:*
  • cpe:2.3:a:oracle:retail_predictive_application_server:16.0.3.0:*:*:*:*:*:*:*
    cpe:2.3:a:oracle:retail_predictive_application_server:16.0.3.0:*:*:*:*:*:*:*
  • cpe:2.3:a:oracle:security_service:11.1.1.9.0:*:*:*:*:*:*:*
    cpe:2.3:a:oracle:security_service:11.1.1.9.0:*:*:*:*:*:*:*
  • cpe:2.3:a:oracle:security_service:12.1.3.0.0:*:*:*:*:*:*:*
    cpe:2.3:a:oracle:security_service:12.1.3.0.0:*:*:*:*:*:*:*
  • cpe:2.3:a:oracle:security_service:12.2.1.3.0:*:*:*:*:*:*:*
    cpe:2.3:a:oracle:security_service:12.2.1.3.0:*:*:*:*:*:*:*
  • cpe:2.3:a:oracle:timesten_in-memory_database:-:*:*:*:*:*:*:*
    cpe:2.3:a:oracle:timesten_in-memory_database:-:*:*:*:*:*:*:*
  • cpe:2.3:a:oracle:timesten_in-memory_database:11.2.2.8.27:*:*:*:*:*:*:*
    cpe:2.3:a:oracle:timesten_in-memory_database:11.2.2.8.27:*:*:*:*:*:*:*
  • cpe:2.3:a:oracle:timesten_in-memory_database:11.2.2.8.49:*:*:*:*:*:*:*
    cpe:2.3:a:oracle:timesten_in-memory_database:11.2.2.8.49:*:*:*:*:*:*:*
  • cpe:2.3:a:oracle:timesten_in-memory_database:18.1.2.1.0:*:*:*:*:*:*:*
    cpe:2.3:a:oracle:timesten_in-memory_database:18.1.2.1.0:*:*:*:*:*:*:*
  • cpe:2.3:a:oracle:timesten_in-memory_database:18.1.3.1.0:*:*:*:*:*:*:*
    cpe:2.3:a:oracle:timesten_in-memory_database:18.1.3.1.0:*:*:*:*:*:*:*
CVSS
Base: 5.0 (as of 18-04-2022 - 18:12)
Impact:
Exploitability:
CWE NVD-CWE-noinfo
CAPEC
Access
VectorComplexityAuthentication
NETWORK LOW NONE
Impact
ConfidentialityIntegrityAvailability
NONE NONE PARTIAL
cvss-vector via4 AV:N/AC:L/Au:N/C:N/I:N/A:P
refmap via4
bid 105929
fulldisc 20181112 DSA-2018-198: RSA BSAFE Micro Edition Suite Key Management Error Vulnerability
misc
sectrack 1042057
Last major update 18-04-2022 - 18:12
Published 16-11-2018 - 21:29
Last modified 18-04-2022 - 18:12
Back to Top