ID

VAR-201412-0616


CVE

CVE-2014-4630


TITLE

EMC RSA BSAFE Micro Edition Suite and RSA BSAFE SSL-J Vulnerability in which important information is obtained

Trust: 0.8

sources: JVNDB: JVNDB-2014-007440

DESCRIPTION

EMC RSA BSAFE Micro Edition Suite (MES) 4.0.x before 4.0.6 and RSA BSAFE SSL-J before 6.1.4 do not ensure that a server's X.509 certificate is the same during renegotiation as it was before renegotiation, which allows man-in-the-middle attackers to obtain sensitive information or modify TLS session data via a "triple handshake attack.". RSA BSAFE Micro Edition Suite and SSL-J are prone to a security-bypass vulnerability because it fails to properly validate SSL certificates. Multiple EMC Products are prone to security-bypass vulnerability. Successfully exploiting this issue may allow attackers to obtain sensitive information by conducting a man-in-the-middle attack. This may lead to other attacks. EMC RSA BSAFE is a security software product of EMC, which supports encryption algorithms, certificate chain verification and Transport Layer Security (TLS) cipher suites, etc., to help users achieve various security goals of their applications . RSA BSAFE SSL-J is one of the SSL toolkits. There are security vulnerabilities in EMC RSA BSAFE MES versions 4.0.0 to 4.0.5 and RSA BSAFE SSL-J 6.1.2 and earlier versions. The vulnerability stems from the fact that the program does not correctly verify the X.509 certificate on the server side. See original advisory for more details: https://www.secure-resumption.com/ MES 4.1, MES 4.0.6 and SSL-J 6.1.4 are designed to include a fix which disallows a change of server certificate when renegotiating. Recommendation: RSA recommends that customers on MES 4.0.x upgrade to MES 4.0.6 or to MES 4.1 and those on SSL-J 5.1.x and SSL-J 6.x upgrade to SSL-J 6.1.4 at the earliest opportunity. Credits: The Triple Handshake attack was originally found by Antoine Delignat-Lavaud, Karthikeyan Bhargavan and Alfredo Pironti from the Prosecco research team at INRIA Paris-Rocquencourt. Obtaining Downloads: To request your upgrade of the software, please call your local support telephone number (contact phone numbers are available at http://www.emc.com/support/rsa/contact/index.htm ) for most expedient service. Obtaining Documentation: To obtain RSA documentation, log on to RSA SecurCare Online at https://knowledge.rsasecurity.com and click Products in the top navigation menu. Select the specific product whose documentation you want to obtain. Scroll to the section for the product version that you want and click the set link. Severity Rating: For an explanation of Severity Ratings, refer to the Knowledge Base Article, \x93Security Advisories Severity Rating\x94 at https://knowledge.rsasecurity.com/scolcms/knowledge.aspx?solution=a46604. RSA recommends all customers take into account both the base score and any relevant temporal and environmental scores which may impact the potential severity associated with particular security vulnerability. Obtaining More Information: For more information about RSA products, visit the RSA web site at http://www.rsa.com. Getting Support and Service: For customers with current maintenance contracts, contact your local RSA Customer Support center with any additional questions regarding this RSA SecurCare Note. For contact telephone numbers or e-mail addresses, log on to RSA SecurCare Online at https://knowledge.rsasecurity.com, click Help & Contact, and then click the Contact Us - Phone tab or the Contact Us - Email tab. General Customer Support Information: http://www.emc.com/support/rsa/index.htm RSA SecurCare Online: https://knowledge.rsasecurity.com EOPS Policy: RSA has a defined End of Primary Support policy associated with all major versions. Please refer to the link below for additional details. http://www.emc.com/support/rsa/eops/index.htm SecurCare Online Security Advisories RSA, The Security Division of EMC, distributes SCOL Security Advisories in order to bring to the attention of users of the affected RSA products important security information. RSA recommends that all users determine the applicability of this information to their individual situations and take appropriate action. The information set forth herein is provided "as is" without warranty of any kind. RSA disclaim all warranties, either express or implied, including the warranties of merchantability, fitness for a particular purpose, title and non-infringement. In no event shall RSA or its suppliers be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of business profits or special damages, even if RSA or its suppliers have been advised of the possibility of such damages. Some states do not allow the exclusion or limitation of liability for consequential or incidental damages so the foregoing limitation may not apply. About RSA SecurCare Notes & Security Advisories Subscription RSA SecurCare Notes & Security Advisories are targeted e-mail messages that RSA sends you based on the RSA product family you currently use. If you\x92d like to stop receiving RSA SecurCare Notes & Security Advisories, or if you\x92d like to change which RSA product family Notes & Security Advisories you currently receive, log on to RSA SecurCare Online at https://knowledge.rsasecurity.com/scolcms/help.aspx?_v=view3. Following the instructions on the page, remove the check mark next to the RSA product family whose Notes & Security Advisories you no longer want to receive. Click the Submit button to save your selection. Sincerely, RSA Customer Support -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.13 (Cygwin) iEYEARECAAYFAlSilLAACgkQtjd2rKp+ALy/DACfRRNnmXgeLG5YF/fVgGTb4vC5 ZhUAnAve9hMZcLDABPDh5CRCnUeS+jcN =oP7U -----END PGP SIGNATURE-----

Trust: 2.34

sources: NVD: CVE-2014-4630 // JVNDB: JVNDB-2014-007440 // BID: 71815 // BID: 72534 // VULHUB: VHN-72571 // PACKETSTORM: 129773

AFFECTED PRODUCTS

vendor:dellmodel:bsafe micro-edition-suitescope:eqversion:4.0.2

Trust: 1.0

vendor:dellmodel:bsafe micro-edition-suitescope:eqversion:4.0.3

Trust: 1.0

vendor:dellmodel:bsafe ssl-jscope:lteversion:6.1.2

Trust: 1.0

vendor:dellmodel:bsafe micro-edition-suitescope:eqversion:4.0.1

Trust: 1.0

vendor:dellmodel:bsafe micro-edition-suitescope:eqversion:4.0.5

Trust: 1.0

vendor:dellmodel:bsafe micro-edition-suitescope:eqversion:4.0.4

Trust: 1.0

vendor:dellmodel:bsafe micro-edition-suitescope:eqversion:4.0.0

Trust: 1.0

vendor:hitachimodel:ucosminexus application serverscope:eqversion:(64)

Trust: 0.8

vendor:hitachimodel:ucosminexus application serverscope:eqversion:express

Trust: 0.8

vendor:hitachimodel:cosminexus primary serverscope:eqversion:version 6

Trust: 0.8

vendor:hitachimodel:ucosminexus clientscope: - version: -

Trust: 0.8

vendor:hitachimodel:web serverscope:eqversion:none

Trust: 0.8

vendor:hitachimodel:ucosminexus developerscope:eqversion:professional for plug-in

Trust: 0.8

vendor:hitachimodel:ucosminexus service platformscope:eqversion:- messaging

Trust: 0.8

vendor:hitachimodel:web serverscope:eqversion:- security enhancement

Trust: 0.8

vendor:hitachimodel:cosminexus application server version 5scope: - version: -

Trust: 0.8

vendor:hitachimodel:ucosminexus developer standardscope: - version: -

Trust: 0.8

vendor:hitachimodel:ucosminexus service platformscope:eqversion:(64)

Trust: 0.8

vendor:hitachimodel:ucosminexus developerscope:eqversion:01

Trust: 0.8

vendor:hitachimodel:cosminexus developer's kit for javascope: - version: -

Trust: 0.8

vendor:hitachimodel:ucosminexus operatorscope:eqversion:for service platform

Trust: 0.8

vendor:hitachimodel:ucosminexus developer lightscope: - version: -

Trust: 0.8

vendor:hitachimodel:ucosminexus application serverscope:eqversion:none

Trust: 0.8

vendor:hitachimodel:cosminexus developer version 5scope: - version: -

Trust: 0.8

vendor:hitachimodel:ucosminexus primary serverscope:eqversion:base

Trust: 0.8

vendor:hitachimodel:cosminexus developer light version 6scope: - version: -

Trust: 0.8

vendor:hitachimodel:ucosminexus application serverscope:eqversion:st ard-r

Trust: 0.8

vendor:hitachimodel:ucosminexus primary serverscope:eqversion:base(64)

Trust: 0.8

vendor:hitachimodel:ucosminexus service platformscope:eqversion:none

Trust: 0.8

vendor:dell emc old emcmodel:rsa bsafescope:eqversion:micro edition suite (mes) 4.0.6

Trust: 0.8

vendor:hitachimodel:cosminexus http serverscope: - version: -

Trust: 0.8

vendor:hitachimodel:ucosminexus application serverscope:eqversion:-r

Trust: 0.8

vendor:hitachimodel:cosminexus primary serverscope:eqversion:base version 6

Trust: 0.8

vendor:hitachimodel:ucosminexus service architectscope: - version: -

Trust: 0.8

vendor:dell emc old emcmodel:rsa bsafescope:ltversion:4.0.x

Trust: 0.8

vendor:hitachimodel:ucosminexus application server enterprisescope: - version: -

Trust: 0.8

vendor:hitachimodel:cosminexus application server standardscope:eqversion:version 6

Trust: 0.8

vendor:hitachimodel:ucosminexus application server standardscope: - version: -

Trust: 0.8

vendor:hitachimodel:cosminexus application server enterprisescope:eqversion:version 6

Trust: 0.8

vendor:hitachimodel:cosminexus developer standard version 6scope: - version: -

Trust: 0.8

vendor:hitachimodel:cosminexus developer professional version 6scope: - version: -

Trust: 0.8

vendor:hitachimodel:ucosminexus developerscope:eqversion:professional

Trust: 0.8

vendor:hitachimodel:ucosminexus developerscope:eqversion:none

Trust: 0.8

vendor:hitachimodel:ucosminexus application server smart editionscope: - version: -

Trust: 0.8

vendor:emcmodel:rsa bsafescope:eqversion:4.0.5

Trust: 0.6

vendor:emcmodel:rsa bsafescope:eqversion:4.0.3

Trust: 0.6

vendor:emcmodel:rsa bsafescope:eqversion:4.0.4

Trust: 0.6

vendor:emcmodel:rsa bsafescope:eqversion:4.0.2

Trust: 0.6

vendor:emcmodel:rsa bsafe ssl-jscope:eqversion:6.1.2

Trust: 0.6

vendor:emcmodel:rsa bsafescope:eqversion:4.0.1

Trust: 0.6

vendor:emcmodel:rsa bsafescope:eqversion:4.0.0

Trust: 0.6

vendor:emcmodel:rsa bsafe ssl-jscope:eqversion:6.0.1

Trust: 0.3

vendor:emcmodel:rsa bsafe ssl-jscope:eqversion:6.0

Trust: 0.3

vendor:emcmodel:rsa bsafe ssl-jscope:eqversion:5.1.2

Trust: 0.3

vendor:emcmodel:rsa bsafe ssl-jscope:eqversion:5.1.1

Trust: 0.3

vendor:emcmodel:rsa bsafe ssl-jscope:eqversion:6.1.1

Trust: 0.3

vendor:emcmodel:rsa bsafe ssl-jscope:eqversion:6.0.2

Trust: 0.3

vendor:emcmodel:rsa bsafe ssl-jscope:eqversion:5.1.3

Trust: 0.3

vendor:emcmodel:rsa bsafe ssl-cscope:eqversion:2.8.7

Trust: 0.3

vendor:emcmodel:rsa bsafe ssl-cscope:eqversion:2.8.9

Trust: 0.3

vendor:emcmodel:rsa bsafe ssl-cscope:eqversion:2.8.8

Trust: 0.3

vendor:emcmodel:rsa bsafe ssl-cscope:eqversion:2.8.6

Trust: 0.3

vendor:emcmodel:rsa bsafe ssl-cscope:eqversion:2.8.5

Trust: 0.3

vendor:emcmodel:rsa bsafe micro edition suitescope:eqversion:4.0.5

Trust: 0.3

vendor:emcmodel:rsa bsafe micro edition suitescope:eqversion:4.0

Trust: 0.3

vendor:emcmodel:rsa bsafe ssl-jscope:neversion:6.1.4

Trust: 0.3

vendor:emcmodel:rsa bsafe micro edition suitescope:neversion:4.1

Trust: 0.3

vendor:emcmodel:rsa bsafe micro edition suitescope:neversion:4.0.6

Trust: 0.3

sources: BID: 72534 // JVNDB: JVNDB-2014-007440 // CNNVD: CNNVD-201412-595 // NVD: CVE-2014-4630

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2014-4630
value: MEDIUM

Trust: 1.0

NVD: CVE-2014-4630
value: MEDIUM

Trust: 0.8

CNNVD: CNNVD-201412-595
value: MEDIUM

Trust: 0.6

VULHUB: VHN-72571
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2014-4630
severity: MEDIUM
baseScore: 4.3
vectorString: AV:N/AC:M/AU:N/C:P/I:N/A:N
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 8.6
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

VULHUB: VHN-72571
severity: MEDIUM
baseScore: 4.3
vectorString: AV:N/AC:M/AU:N/C:P/I:N/A:N
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 8.6
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: VULHUB: VHN-72571 // JVNDB: JVNDB-2014-007440 // CNNVD: CNNVD-201412-595 // NVD: CVE-2014-4630

PROBLEMTYPE DATA

problemtype:CWE-310

Trust: 1.9

sources: VULHUB: VHN-72571 // JVNDB: JVNDB-2014-007440 // NVD: CVE-2014-4630

THREAT TYPE

network

Trust: 0.6

sources: BID: 71815 // BID: 72534

TYPE

Design Error

Trust: 0.6

sources: BID: 71815 // BID: 72534

CONFIGURATIONS

sources: JVNDB: JVNDB-2014-007440

EXPLOIT AVAILABILITY

sources: VULHUB: VHN-72571

PATCH

title:RSA BSAFEurl:http://japan.emc.com/security/rsa-bsafe.htm

Trust: 0.8

title:HS15-020url:http://www.hitachi.co.jp/Prod/comp/soft1/global/security/info/vuls/HS15-020/index.html

Trust: 0.8

title:HS15-017url:http://www.hitachi.co.jp/Prod/comp/soft1/global/security/info/vuls/HS15-017/index.html

Trust: 0.8

title:HS15-020url:http://www.hitachi.co.jp/Prod/comp/soft1/security/info/vuls/HS15-020/index.html

Trust: 0.8

title:HS15-017url:http://www.hitachi.co.jp/Prod/comp/soft1/security/info/vuls/HS15-017/index.html

Trust: 0.8

title:EMC RSA BSAFE Micro Edition Suite and RSA BSAFE SSL-J Fixes for encryption problem vulnerabilitiesurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=172324

Trust: 0.6

sources: JVNDB: JVNDB-2014-007440 // CNNVD: CNNVD-201412-595

EXTERNAL IDS

db:NVDid:CVE-2014-4630

Trust: 3.2

db:BIDid:72534

Trust: 2.0

db:JVNDBid:JVNDB-2014-007440

Trust: 0.8

db:CNNVDid:CNNVD-201412-595

Trust: 0.6

db:BIDid:71815

Trust: 0.4

db:PACKETSTORMid:129773

Trust: 0.2

db:VULHUBid:VHN-72571

Trust: 0.1

sources: VULHUB: VHN-72571 // BID: 71815 // BID: 72534 // JVNDB: JVNDB-2014-007440 // PACKETSTORM: 129773 // CNNVD: CNNVD-201412-595 // NVD: CVE-2014-4630

REFERENCES

url:http://archives.neohapsis.com/archives/bugtraq/2014-12/0169.html

Trust: 2.5

url:https://secure-resumption.com/

Trust: 2.5

url:http://www.securityfocus.com/bid/72534

Trust: 1.7

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-4630

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2014-4630

Trust: 0.8

url:http://www.emc.com/

Trust: 0.3

url:http://seclists.org/bugtraq/2015/feb/att-29/esa-2014-158.txt

Trust: 0.3

url:https://knowledge.rsasecurity.com/scolcms/knowledge.aspx?solution=a46604.

Trust: 0.1

url:http://www.emc.com/support/rsa/eops/index.htm

Trust: 0.1

url:http://www.rsa.com.

Trust: 0.1

url:https://www.secure-resumption.com/

Trust: 0.1

url:https://knowledge.rsasecurity.com/scolcms/help.aspx?_v=view3.

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2014-4630

Trust: 0.1

url:https://knowledge.rsasecurity.com

Trust: 0.1

url:http://www.emc.com/support/rsa/contact/index.htm

Trust: 0.1

url:http://www.emc.com/support/rsa/index.htm

Trust: 0.1

url:https://knowledge.rsasecurity.com,

Trust: 0.1

sources: VULHUB: VHN-72571 // BID: 72534 // JVNDB: JVNDB-2014-007440 // PACKETSTORM: 129773 // CNNVD: CNNVD-201412-595 // NVD: CVE-2014-4630

CREDITS

Antoine Delignat-Lavaud, Karthikeyan Bhargavan and Alfredo Pironti

Trust: 0.3

sources: BID: 71815

SOURCES

db:VULHUBid:VHN-72571
db:BIDid:71815
db:BIDid:72534
db:JVNDBid:JVNDB-2014-007440
db:PACKETSTORMid:129773
db:CNNVDid:CNNVD-201412-595
db:NVDid:CVE-2014-4630

LAST UPDATE DATE

2024-11-23T22:52:49.307000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-72571date:2021-12-09T00:00:00
db:BIDid:71815date:2014-12-30T00:00:00
db:BIDid:72534date:2015-02-05T00:00:00
db:JVNDBid:JVNDB-2014-007440date:2015-04-27T00:00:00
db:CNNVDid:CNNVD-201412-595date:2021-12-01T00:00:00
db:NVDid:CVE-2014-4630date:2024-11-21T02:10:36.370

SOURCES RELEASE DATE

db:VULHUBid:VHN-72571date:2014-12-30T00:00:00
db:BIDid:71815date:2014-12-30T00:00:00
db:BIDid:72534date:2015-02-05T00:00:00
db:JVNDBid:JVNDB-2014-007440date:2015-01-06T00:00:00
db:PACKETSTORMid:129773date:2014-12-31T16:22:22
db:CNNVDid:CNNVD-201412-595date:2014-12-30T00:00:00
db:NVDid:CVE-2014-4630date:2014-12-30T15:59:00.063