CAPKI r4.3.4 has been signed off and the builds are available for use in embedded installer components.
Products affected:
EEM via CA Directory R12 all versions prior to SP14.
Any existing CA Directory r12 host (prior to SP14) can apply this CAPKI patch independently.
Issues/Vulnerabilities addressed as part of this release:
Issue/Vulnerability | Description of the Issue/Vulnerability |
CVE-2014-0224 | SSL/TLS MITM vulnerability |
CVE-2014-0221 | DTLS recursion flaw |
CVE-2014-3470 | Anonymous ECDH denial of service |
CVE-2014-0076 | Recovering OpenSSL ECDSA Nonces |
EEM Development will be applying the latest CA Directory R12 SP14 to their install packages during the next development cycle.
If you require this patch immediately, please open a case with CA Support with a business impact and justification.