First published: Fri Apr 11 2014(Updated: )
EMC RSA BSAFE Micro Edition Suite (MES) 3.2.x before 3.2.6 and 4.0.x before 4.0.5 does not properly validate X.509 certificate chains, which allows man-in-the-middle attackers to spoof SSL servers via a crafted certificate chain.
Credit: security_alert@emc.com
Affected Software | Affected Version | How to fix |
---|---|---|
Dell BSAFE Micro Edition Suite | =3.2.0 | |
Dell BSAFE Micro Edition Suite | =3.2.1 | |
Dell BSAFE Micro Edition Suite | =3.2.2 | |
Dell BSAFE Micro Edition Suite | =3.2.3 | |
Dell BSAFE Micro Edition Suite | =3.2.4 | |
Dell BSAFE Micro Edition Suite | =3.2.5 | |
Dell BSAFE Micro Edition Suite | =4.0.0 | |
Dell BSAFE Micro Edition Suite | =4.0.1 | |
Dell BSAFE Micro Edition Suite | =4.0.2 | |
Dell BSAFE Micro Edition Suite | =4.0.3 | |
Dell BSAFE Micro Edition Suite | =4.0.4 | |
=3.2.0 | ||
=3.2.1 | ||
=3.2.2 | ||
=3.2.3 | ||
=3.2.4 | ||
=3.2.5 | ||
=4.0.0 | ||
=4.0.1 | ||
=4.0.2 | ||
=4.0.3 | ||
=4.0.4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2014-0636 has a high severity rating due to its potential for allowing man-in-the-middle attacks.
To fix CVE-2014-0636, upgrade to EMC RSA BSAFE Micro Edition Suite versions 3.2.6 or 4.0.5 or later.
CVE-2014-0636 affects versions 3.2.0 to 3.2.5 and 4.0.0 to 4.0.4 of EMC RSA BSAFE Micro Edition Suite.
CVE-2014-0636 can facilitate man-in-the-middle attacks through improper validation of X.509 certificate chains.
There are no effective workarounds for CVE-2014-0636; updating the software is the best mitigation strategy.