-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2010.0699
   A vulnerability has been identified in RSA enVision prior to 3.7 SP1
                               9 August 2010

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:          RSA enVision prior to 3.7 SP1
Publisher:        RSA
Operating System: Network Appliance
                  Windows Server 2003
Impact/Access:    Denial of Service -- Remote/Unauthenticated
Resolution:       Patch/Upgrade
CVE Names:        CVE-2010-2634  

- --------------------------BEGIN INCLUDED TEXT--------------------

- -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

RSA, The Security Division of EMC, informs about potential security
vulnerability in RSA enVision® versions prior 3.7 SP1

Security Advisory

Updated July 30, 2010


Summary:

RSA enVision versions prior 3.7 SP1 may contain potential denial of
service vulnerability.



Description:

CVE Identification: CVE-2010-2634

RSA enVision versions prior 3.7 SP1 may contain potential security
vulnerability due to insufficient input validation. This may be
exploited by malicious

people to cause denial of service on the affected system.



Common Vulnerability Scoring System (CVSS) Base Score:

The Common Vulnerability Scoring System (CVSS) Base Score for the items
identified in this advisory is CVSS v2 Base Score: 4
(AV:N/AC:L/Au:S/C:N/I:N/A:P)



Affected Products:

* RSA enVision versions prior 3.7 SP1


Unaffected Products:

* RSA enVision 3.7 SP1
* RSA envision 4.0


Recommendations:

This issue is already addressed in the following versions of enVision:

* RSA enVision 3.7 SP1 and later
* RSA enVision 4.0 and later

RSA strongly recommends that customers upgrade their deployment at the
earliest opportunity.



Obtaining Downloads:

To obtain the latest RSA product downloads, log on to RSA SecurCare
Online at https://knowledge.rsasecurity.com and click Products in the
top navigation

menu. Select the specific product whose download you want to obtain.
Scroll to the section for the product download that you want and click
on the link.



Credits:

RSA would like to thank Abdoul Karim Ganame for reporting this issue.



Common Vulnerability Scoring System (CVSS) Base Score:

The Common Vulnerability Scoring System (CVSS) Base Score for the items
identified in this advisory is 4 (AV:N/AC:L/Au:N/C:P/I:P/A:P) For more
information on

CVSS scoring, please see the Knowledge Base Article, "Security
Advisories Severity Rating" at
https://knowledge.rsasecurity.com/scolcms/knowledge.aspx?

solution=a46604.



Obtaining Documentation:

To obtain RSA documentation, log on to RSA SecurCare Online at
https://knowledge.rsasecurity.com and click Products in the top
navigation menu. Select the

specific product whose documentation you want to obtain. Scroll to the
section for the product version that you want and click the set link.



Obtaining More Information:

For more information about RSA enVision, visit the RSA web site at
http://www.rsa.com/node.aspx?id=3170.



Getting Support and Service:

For customers with current maintenance contracts, contact your local RSA
Customer Support center with any additional questions regarding this RSA
SecurCare

Note. For contact telephone numbers or e-mail addresses, log on to RSA
SecurCare Online at https://knowledge.rsasecurity.com, click Help &
Contact, and then

click the Contact Us - Phone tab or the Contact Us - Email tab.



General Customer Support Information:

http://www.rsa.com/node.aspx?id=1264



RSA SecurCare Online:

https://knowledge.rsasecurity.com



EOPS Policy:

RSA has a defined End of Primary Support policy associated with all
major versions. Please refer to the link below for additional details.
http://www.rsa.com/node.aspx?id=2575



SecurCare Online Security Advisories

RSA, The Security Division of EMC, distributes SCOL Security Advisories
in order to bring to the attention of users of the affected RSA products
important

security information. RSA recommends that all users determine the
applicability of this information to their individual situations and
take appropriate

action. The information set forth herein is provided "as is" without
warranty of any kind. RSA disclaim all warranties, either express or
implied, including

the warranties of merchantability, fitness for a particular purpose,
title and non-infringement. In no event shall RSA or its suppliers be
liable for any

damages whatsoever including direct, indirect, incidental,
consequential, loss of business profits or special damages, even if RSA
or its suppliers have been

advised of the possibility of such damages. Some states do not allow the
exclusion or limitation of liability for consequential or incidental
damages so the

foregoing limitation may not apply.



About RSA SecurCare Notes & Security Advisories Subscription

RSA SecurCare Notes & Security Advisories are targeted e-mail messages
that RSA sends you based on the RSA product family you currently use. If
youÂ’d like to

stop receiving RSA SecurCare Notes & Security Advisories, or if youÂ’d
like to change which RSA product family Notes & Security Advisories you
currently

receive, log on to RSA SecurCare Online at
https://knowledge.rsasecurity.com/scolcms/help.aspx?_v=view5. Following
the instructions on the page, remove the

check mark next to the RSA product family whose Notes & Security
Advisories you no longer want to receive. Click the Submit button to
save your selection.

EMC Product Security Response Center
Security_Alert@emc.com
www.emc.com/contact-us/contact/product-security-response-center.htm

- -----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.9 (Cygwin)

iEYEARECAAYFAkxYjrcACgkQtjd2rKp+ALx3sQCcCBpwzUTmGasyIcI18RugFGx0
xigAnjQCssKArKfw9OI/4M6Mb6A8m27l
=Xmud
- -----END PGP SIGNATURE-----

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        http://www.auscert.org.au/render.html?cid=1980

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967

iD8DBQFMX149/iFOrG6YcBERAvauAJ9oSGKcQnCQiAcnddSq7KIXilpDEgCcCKsJ
wuINyj1mfVqc8QaRU/k279U=
=ZCT0
-----END PGP SIGNATURE-----