exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

RSA enVision Credential Disclosure / File Retrieval

RSA enVision Credential Disclosure / File Retrieval
Posted Aug 25, 2011
Site emc.com

RSA, the security division of EMC, announces security fixes to address two security vulnerabilities in RSA enVision. These include arbitrary file retrieval and credentials being mailed in the clear.

tags | advisory, arbitrary, vulnerability
advisories | CVE-2011-2736, CVE-2011-2737
SHA-256 | 21733d753cf541d05c9bdb1f1335a9efc8d4ec5ead044111b3d8aaaab1ffcf89

RSA enVision Credential Disclosure / File Retrieval

Change Mirror Download
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

ESA-2011-030: RSA, The Security Division of EMC, announces security fixes for RSA enVision

Advisories
Updated August 22, 2011


Summary:

RSA, The Security Division of EMC, announces security fixes to address two security vulnerabilities in RSA enVision®.



Affected Products:

RSA enVision 4.x
RSA enVision 3.x



Description:

CVE Identifiers: CVE-2011-2736, CVE-2011-2737.

This release addresses the following security vulnerabilities:

•Task Escalation emails may include administrative credentials in clear (CVE-2011-2736). This issue only affects RSA enVision 4.x.

•RSA enVision contains an arbitrary file retrieval vulnerability that may allow unauthenticated users to access files from affected drive (CVE-2011-2737).

Further information about this resolution and other bug fixes can be found in the Release Notes associated with RSA enVision 4 SP4 P3.



Recommendation:

RSA strongly recommends that enVision customers upgrade to RSA enVision 4 SP4 P3 which contains the resolution for both issues.



Common Vulnerability Scoring System (CVSS) Base Score:

The Common Vulnerability Scoring System (CVSS) base scores for the items identified in this advisory are:

CVE-2011-2736: CVSSv2 Base Score is 8.5 (AV:N/AC:M/Au:S/C:C/I:C/A:C)

CVE-2011-2737: CVSSv2 Base Score is 7.8 (AV:N/AC:L/Au:N/C:C/I:N/A:N)

RSA recommends that all customers take into account both the base score and any relevant temporal and environmental scores, which may impact the potential severity associated with a particular security vulnerability.

For more information on CVSS scoring, please see the Knowledge Base Article, "Security Advisories Severity Rating" at https://knowledge.rsasecurity.com/scolcms/knowledge.aspx?solution=a46604 .



Obtaining Downloads:

To obtain the latest RSA product downloads, log on to RSA SecurCare Online at https://knowledge.rsasecurity.com and click Products in the top navigation menu. Select the specific product whose download you want to obtain. Scroll to the section for the product download that you want and click on the link.



Obtaining Documentation:

To obtain RSA documentation, log on to RSA SecurCare Online at https://knowledge.rsasecurity.com and click Products in the top navigation menu. Select the specific product whose documentation you want to obtain. Scroll to the section for the product version that you want and click the set link.



Obtaining More Information:

For more information about RSA enVision, visit the RSA web site at https://www.rsa.com/node.aspx?id=3170.



Getting Support and Service:

For customers with current maintenance contracts, contact your local RSA Customer Support center with any additional questions regarding this RSA SecurCare Note. For contact telephone numbers or e-mail addresses, log on to RSA SecurCare Online at https://knowledge.rsasecurity.com, click Help & Contact, and then click the Contact Us - Phone tab or the Contact Us - Email tab.



General Customer Support Information:

https://www.rsa.com/node.aspx?id=1264



RSA SecurCare Online:

https://knowledge.rsasecurity.com



EOPS Policy:

RSA has a defined End of Primary Support policy associated with all major versions. Please refer to the link below for additional details.
https://www.rsa.com/node.aspx?id=2575



SecurCare Online Security Advisories

RSA, The Security Division of EMC, distributes SCOL Security Advisories in order to bring to the attention of users of the affected RSA products important security information. RSA recommends that all users determine the applicability of this information to their individual situations and take appropriate action. The information set forth herein is provided "as is" without warranty of any kind. RSA disclaim all warranties, either express or implied, including the warranties of merchantability, fitness for a particular purpose, title and non-infringement. In no event shall RSA or its suppliers be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of business profits or special damages, even if RSA or its suppliers have been advised of the possibility of such damages. Some states do not allow the exclusion or limitation of liability for consequential or incidental damages so the foregoing limitation may not apply.



About RSA SecurCare Notes & Security Advisories Subscription

RSA SecurCare Notes & Security Advisories are targeted e-mail messages that RSA sends you based on the RSA product family you currently use. If you’d like to stop receiving RSA SecurCare Notes & Security Advisories, or if you’d like to change which RSA product family Notes & Security Advisories you currently receive, log on to RSA SecurCare Online at https://knowledge.rsasecurity.com/scolcms/help.aspx?_v=view3. Following the instructions on the page, remove the check mark next to the RSA product family whose Notes & Security Advisories you no longer want to receive. Click the Submit button to save your selection.

EMC Product Security Response Center
Security_Alert@EMC.com
https://www.emc.com/contact-us/contact/product-security-response-center.htm



-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.9 (Cygwin)

iEYEARECAAYFAk5TvuwACgkQtjd2rKp+ALzbzQCgiHn1iUN71QJ6AWpaOi0HT1c1
TYgAnixNEY7lHzXgZ3sw+0Bb4QZmEf33
=ke+G
-----END PGP SIGNATURE-----
Login or Register to add favorites

File Archive:

November 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    30 Files
  • 2
    Nov 2nd
    0 Files
  • 3
    Nov 3rd
    0 Files
  • 4
    Nov 4th
    12 Files
  • 5
    Nov 5th
    44 Files
  • 6
    Nov 6th
    18 Files
  • 7
    Nov 7th
    9 Files
  • 8
    Nov 8th
    8 Files
  • 9
    Nov 9th
    3 Files
  • 10
    Nov 10th
    0 Files
  • 11
    Nov 11th
    14 Files
  • 12
    Nov 12th
    20 Files
  • 13
    Nov 13th
    69 Files
  • 14
    Nov 14th
    0 Files
  • 15
    Nov 15th
    0 Files
  • 16
    Nov 16th
    0 Files
  • 17
    Nov 17th
    0 Files
  • 18
    Nov 18th
    0 Files
  • 19
    Nov 19th
    0 Files
  • 20
    Nov 20th
    0 Files
  • 21
    Nov 21st
    0 Files
  • 22
    Nov 22nd
    0 Files
  • 23
    Nov 23rd
    0 Files
  • 24
    Nov 24th
    0 Files
  • 25
    Nov 25th
    0 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    0 Files
  • 28
    Nov 28th
    0 Files
  • 29
    Nov 29th
    0 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close