Heap-based buffer overflow in RSA BSAFE Micro Edition Suite



Risk Low
Patch available YES
Number of vulnerabilities 1
CVE-ID CVE-2019-3729
CWE-ID CWE-122
Exploitation vector Local network
Public exploit N/A
Vulnerable software
RSA BSAFE Micro Edition Suite
Client/Desktop applications / Other client software

Vendor Dell

Security Bulletin

This security bulletin contains one low risk vulnerability.

1) Heap-based buffer overflow

EUVDB-ID: #VU21459

Risk: Low

CVSSv4.0: 1.1 [CVSS:4.0/AV:A/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2019-3729

CWE-ID: CWE-122 - Heap-based Buffer Overflow

Exploit availability: No

Description

The vulnerability allows an attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to a boundary error when parsing ECDSA signature. An authenticated user with adjacent network access can trigger heap-based buffer overflow and cause a crash in the library of the affected system.

This vulnerability affects the following versions:

  • RSA BSAFE Micro Edition Suite - versions prior to 4.4 (in 4.0.x, 4.1.x, 4.2.x and 4.3.x)

Mitigation

Install updates from vendor's website.

Vulnerable software versions

RSA BSAFE Micro Edition Suite: All versions

CPE2.3 External links

https://www.dell.com/support/security/en-us/details/DOC-107000/DSA-2019-079-RSA-BSAFE®-Crypto-C-Micro-Edition-and-Micro-Edition-Suite-Multiple-Security-Vulnerab


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote authenticated privileged user via the local network (LAN).

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.



###SIDEBAR###