RSA BSAFE Micro Edition Suite, versions prior to 4.0.11 (in 4.0.x) and prior to 4.1.6.1 (in 4.1.x) contains a Covert Timing Channel vulnerability during RSA decryption, also known as a Bleichenbacher attack on RSA decryption. A remote attacker may be able to recover a RSA key.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
History
21 Nov 2024, 03:42
Type | Values Removed | Values Added |
---|---|---|
References | () http://seclists.org/fulldisclosure/2018/Aug/46 - Mailing List, Third Party Advisory | |
References | () https://www.oracle.com/security-alerts/cpuapr2020.html - Patch, Third Party Advisory | |
References | () https://www.oracle.com/security-alerts/cpujan2020.html - Patch, Third Party Advisory | |
References | () https://www.oracle.com/security-alerts/cpujul2020.html - Patch, Third Party Advisory | |
References | () https://www.oracle.com/security-alerts/cpuoct2020.html - Patch, Third Party Advisory | |
References | () https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html - Patch, Third Party Advisory |
Information
Published : 2018-08-31 18:29
Updated : 2024-11-21 03:42
NVD link : CVE-2018-11057
Mitre link : CVE-2018-11057
CVE.ORG link : CVE-2018-11057
JSON object : View
Products Affected
oracle
- communications_analytics
- security_service
- enterprise_manager_ops_center
- communications_ip_service_activator
- retail_predictive_application_server
- application_testing_suite
- real_user_experience_insight
- jd_edwards_enterpriseone_tools
- timesten_in-memory_database
- core_rdbms
- goldengate_application_adapters
dell
- bsafe
CWE
CWE-327
Use of a Broken or Risky Cryptographic Algorithm