| name |
Microsoft Exchange Server 2003 Enterprise Edition, Version/Build 6.5.7226.0 and Hotfix MS05-021 |
Infineon Smart Card IC (Security Controller) SLE66CLX800PE / m1581-e12, SLE66CLX800PEM / m1580-e12, SLE66CLX800PES / m1582-e12, SLE66CLX360PE / m1587-e12, SLE66CLX360PEM / m1588-e12 and SLE66CLX360PES / m1589-e12 with specific IC Dedicated Software |
| category |
Operating Systems |
ICs, Smart Cards and Smart Card-Related Devices and Systems |
| scheme |
DE |
DE |
| status |
archived |
archived |
| not_valid_after |
01.09.2019 |
01.09.2019 |
| not_valid_before |
09.11.2005 |
29.01.2007 |
| cert_link |
None |
None |
| report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0284a.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0399a.pdf |
| st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0284b.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0399b.pdf |
| manufacturer |
Microsoft Corporation |
Infineon Technologies AG |
| manufacturer_web |
https://www.microsoft.com |
https://www.infineon.com/ |
| security_level |
EAL4+, ALC_FLR.3 |
EAL5+, AVA_VLA.4, AVA_MSU.3, ALC_DVS.2 |
| dgst |
bbe326d5bfbd5036 |
b388d8aec0f6722d |
| heuristics/cert_id |
BSI-DSZ-CC-0284-2005 |
BSI-DSZ-CC-0399-2007 |
| heuristics/cert_lab |
BSI |
BSI |
| heuristics/cpe_matches |
{} |
{} |
| heuristics/verified_cpe_matches |
{} |
{} |
| heuristics/related_cves |
{} |
{} |
| heuristics/direct_transitive_cves |
{} |
{} |
| heuristics/indirect_transitive_cves |
{} |
CVE-2021-3011 |
| heuristics/extracted_sars |
AVA_MSU.2, ALC_FLR.3, ATE_FUN.1, ADV_RCR.1, ASE_INT.1, ADV_LLD.1, ASE_ENV.1, ATE_IND.2, AVA_VLA.2, ATE_DPT.1, AGD_USR.1, ASE_REQ.1, ASE_SRE.1, ADV_IMP.1, ALC_LCD.1, ADV_HLD.2, ATE_COV.2, ASE_PPC.1, ASE_DES.1, ALC_DVS.1, ALC_TAT.1, ADV_FSP.2, ADV_IGS.1, AGD_ADM.1, ADV_FUN.1, AVA_SOF.1, ASE_OBJ.1, ASE_TSS.1, ADV_SPM.1 |
ADV_INT.1, ATE_FUN.1, ASE_INT.1, ADV_LLD.1, ADV_IMP.2, ASE_ENV.1, ADV_RCR.2, ATE_IND.2, AGD_USR.1, ASE_REQ.1, ADV_HLD.3, ADV_FSP.3, ASE_SRE.1, ALC_DVS.2, ATE_DPT.2, AVA_VLA.4, ATE_COV.2, AVA_MSU.3, ASE_PPC.1, ALC_LCD.2, ADV_SPM.3, ASE_DES.1, AGD_ADM.1, AVA_SOF.1, ASE_OBJ.1, ASE_TSS.1, ALC_TAT.2, AVA_CCA.1 |
| heuristics/extracted_versions |
6.5.7226.0 |
- |
| heuristics/prev_certificates |
{} |
{} |
| heuristics/next_certificates |
{} |
{} |
| heuristics/report_references/directly_referenced_by |
{} |
BSI-DSZ-CC-0482-2008, BSI-DSZ-CC-0498-2009, BSI-DSZ-CC-0447-2008, JISEC-CC-CRP-C0229, BSI-DSZ-CC-0457-2008, BSI-DSZ-CC-0507-2008, BSI-DSZ-CC-0437-2008, BSI-DSZ-CC-0430-2008, BSI-DSZ-CC-0431-2007 |
| heuristics/report_references/directly_referencing |
{} |
BSI-DSZ-CC-0322-2005 |
| heuristics/report_references/indirectly_referenced_by |
{} |
BSI-DSZ-CC-0668-2010, BSI-DSZ-CC-0425-2009, BSI-DSZ-CC-0663-2009, BSI-DSZ-CC-0528-2008, BSI-DSZ-CC-0667-2010, BSI-DSZ-CC-0593-2009, ANSSI-CC-2011/10, BSI-DSZ-CC-0568-2008, BSI-DSZ-CC-0447-2008, BSI-DSZ-CC-0538-2008, ANSSI-CC-2011/16, ANSSI-CC-2011/79, ANSSI-CC-2011/12, BSI-DSZ-CC-0507-2008, BSI-DSZ-CC-0437-2008, BSI-DSZ-CC-0523-2008, ANSSI-CC-2009/17, BSI-DSZ-CC-0665-2010, BSI-DSZ-CC-0626-2009, BSI-DSZ-CC-0498-2009, ANSSI-CC-2012/09, BSI-DSZ-CC-0576-2009, JISEC-CC-CRP-C0229, BSI-DSZ-CC-0784-2013, BSI-DSZ-CC-0630-2010, BSI-DSZ-CC-0572-2008, ANSSI-CC-2011/80, BSI-DSZ-CC-0430-2008, BSI-DSZ-CC-0482-2008, ANSSI-CC-2010/06, BSI-DSZ-CC-0628-2009, BSI-DSZ-CC-0457-2008, BSI-DSZ-CC-0431-2007, ANSSI-CC-2011/13 |
| heuristics/report_references/indirectly_referencing |
{} |
BSI-DSZ-CC-0322-2005, BSI-DSZ-CC-0223-2003, BSI-DSZ-CC-0266-2005, BSI-DSZ-CC-0169-2002 |
| heuristics/scheme_data |
|
|
| heuristics/st_references/directly_referenced_by |
{} |
BSI-DSZ-CC-0498-2009, BSI-DSZ-CC-0447-2008, JISEC-CC-CRP-C0229, BSI-DSZ-CC-0457-2008, BSI-DSZ-CC-0507-2008 |
| heuristics/st_references/directly_referencing |
{} |
BSI-DSZ-CC-0266-2005, BSI-DSZ-CC-0322-2005 |
| heuristics/st_references/indirectly_referenced_by |
{} |
BSI-DSZ-CC-0498-2009, BSI-DSZ-CC-0447-2008, JISEC-CC-CRP-C0229, BSI-DSZ-CC-0457-2008, BSI-DSZ-CC-0507-2008 |
| heuristics/st_references/indirectly_referencing |
{} |
BSI-DSZ-CC-0266-2005, BSI-DSZ-CC-0322-2005 |
| heuristics/protection_profiles |
{} |
{} |
| maintenance_updates |
|
- maintenance_date: 29.01.2009
- maintenance_report_link: https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0399_ma2.pdf
- maintenance_st_link: None
- maintenance_title: Infineon Smart Card IC (Security Controller) SLE66CLX800PE / m1581-e12, SLE66CLX800PEM / m1580-e12, SLE66CLX800PES / m1582-e12, SLE66CLX360PE / m1587-e12, SLE66CLX360PEM / m1588-e12 and SLE66CLX360PES / m1589-e12 with specific IC Dedicated Software
- maintenance_date: 26.11.2007
- maintenance_report_link: https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0399_ma1.pdf
- maintenance_st_link: None
- maintenance_title: Infineon Smart Card IC (Security Controller) SLE66CLX800PE / m1581-e12, SLE66CLX800PEM / m1580-e12, SLE66CLX800PES / m1582-e12, SLE66CLX360PE / m1587-e12, SLE66CLX360PEM / m1588-e12 and SLE66CLX360PES / m1589-e12 with specific IC Dedicated Software
|
| protection_profiles |
|
|
| protection_profile_links |
{} |
{} |
| pdf_data/cert_filename |
None |
None |
| pdf_data/cert_frontpage |
|
|
| pdf_data/cert_keywords/cc_cert_id |
|
|
| pdf_data/cert_keywords/cc_protection_profile_id |
|
|
| pdf_data/cert_keywords/cc_security_level |
|
|
| pdf_data/cert_keywords/cc_sar |
|
|
| pdf_data/cert_keywords/cc_sfr |
|
|
| pdf_data/cert_keywords/cc_claims |
|
|
| pdf_data/cert_keywords/vendor |
|
|
| pdf_data/cert_keywords/eval_facility |
|
|
| pdf_data/cert_keywords/symmetric_crypto |
|
|
| pdf_data/cert_keywords/asymmetric_crypto |
|
|
| pdf_data/cert_keywords/pq_crypto |
|
|
| pdf_data/cert_keywords/hash_function |
|
|
| pdf_data/cert_keywords/crypto_scheme |
|
|
| pdf_data/cert_keywords/crypto_protocol |
|
|
| pdf_data/cert_keywords/randomness |
|
|
| pdf_data/cert_keywords/cipher_mode |
|
|
| pdf_data/cert_keywords/ecc_curve |
|
|
| pdf_data/cert_keywords/crypto_engine |
|
|
| pdf_data/cert_keywords/tls_cipher_suite |
|
|
| pdf_data/cert_keywords/crypto_library |
|
|
| pdf_data/cert_keywords/vulnerability |
|
|
| pdf_data/cert_keywords/side_channel_analysis |
|
|
| pdf_data/cert_keywords/technical_report_id |
|
|
| pdf_data/cert_keywords/device_model |
|
|
| pdf_data/cert_keywords/tee_name |
|
|
| pdf_data/cert_keywords/os_name |
|
|
| pdf_data/cert_keywords/cplc_data |
|
|
| pdf_data/cert_keywords/ic_data_group |
|
|
| pdf_data/cert_keywords/standard_id |
|
|
| pdf_data/cert_keywords/javacard_version |
|
|
| pdf_data/cert_keywords/javacard_api_const |
|
|
| pdf_data/cert_keywords/javacard_packages |
|
|
| pdf_data/cert_keywords/certification_process |
|
|
| pdf_data/cert_metadata |
|
|
| pdf_data/report_filename |
0284a.pdf |
0399a.pdf |
| pdf_data/report_frontpage |
- DE:
- cert_id: BSI-DSZ-CC-0284-2005
- cert_item: Microsoft Exchange Server 2003 Enterprise Edition, Version/Build 6.5.7226.0 and Hotfix MS05-021
- cert_lab: BSI
- developer: Microsoft Corporation
- match_rules: ['(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)']
|
- DE:
- cert_id: BSI-DSZ-CC-0399-2007
- cert_item: Infineon Smart Card IC (Security Controller) SLE66CLX800PE / m1581-e12, SLE66CLX800PEM / m1580-e12, SLE66CLX800PES / m1582-e12, SLE66CLX360PE / m1587-e12, SLE66CLX360PEM / m1588-e12 and SLE66CLX360PES / m1589-e12 with specific IC Dedicated Software
- cert_lab: BSI
- developer: Infineon Technologies AG
- match_rules: ['(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)']
|
| pdf_data/report_keywords/cc_cert_id |
|
- DE:
- BSI-DSZ-CC-0322-2005: 1
- BSI-DSZ-CC-0399-2007: 25
- BSI-DSZ-CC-322-2005: 1
- BSI-DSZ-CC-338-2005: 1
|
| pdf_data/report_keywords/cc_protection_profile_id |
|
- BSI:
- BSI-PP- 0002-2001: 1
- BSI-PP-0002-2001: 4
|
| pdf_data/report_keywords/cc_security_level |
- EAL:
- EAL 1: 1
- EAL 4: 1
- EAL 7: 1
- EAL1: 5
- EAL2: 3
- EAL3: 4
- EAL4: 9
- EAL4 augmented: 2
- EAL4+: 1
- EAL5: 6
- EAL6: 3
- EAL7: 4
|
- EAL:
- EAL 1: 1
- EAL 4: 1
- EAL 7: 1
- EAL1: 5
- EAL2: 3
- EAL3: 4
- EAL4: 10
- EAL5: 10
- EAL5 augmented: 3
- EAL5+: 2
- EAL6: 3
- EAL7: 4
|
| pdf_data/report_keywords/cc_sar |
- ACM:
- ACM_AUT: 2
- ACM_AUT.1: 1
- ACM_CAP: 2
- ACM_CAP.4: 1
- ACM_SCP: 2
- ACM_SCP.2: 1
- ADO:
- ADO_DEL: 2
- ADO_DEL.2: 1
- ADO_IGS: 2
- ADO_IGS.1: 1
- ADV:
- ADV_FSP: 2
- ADV_FSP.2: 1
- ADV_HLD: 2
- ADV_HLD.2: 1
- ADV_IMP: 2
- ADV_IMP.1: 1
- ADV_INT: 2
- ADV_LLD: 2
- ADV_LLD.1: 1
- ADV_RCR: 2
- ADV_RCR.1: 1
- ADV_SPM: 2
- ADV_SPM.1: 1
- AGD:
- AGD_ADM: 2
- AGD_ADM.1: 1
- AGD_USR: 2
- AGD_USR.1: 1
- ALC:
- ALC_DVS: 2
- ALC_DVS.1: 1
- ALC_FLR: 2
- ALC_FLR.3: 3
- ALC_LCD: 1
- ALC_LCD.1: 1
- ALC_TAT: 2
- ALC_TAT.1: 1
- ASE:
- ASE_DES.1: 1
- ASE_ENV.1: 1
- ASE_INT.1: 1
- ASE_OBJ.1: 1
- ASE_PPC.1: 1
- ASE_REQ.1: 1
- ASE_SRE.1: 1
- ASE_TSS.1: 1
- ATE:
- ATE_COV: 2
- ATE_COV.2: 1
- ATE_DPT: 2
- ATE_DPT.1: 1
- ATE_FUN: 2
- ATE_FUN.1: 1
- ATE_IND: 2
- ATE_IND.2: 1
- AVA:
- AVA_CCA: 2
- AVA_MSU: 2
- AVA_MSU.2: 1
- AVA_SOF: 4
- AVA_SOF.1: 1
- AVA_VLA: 4
- AVA_VLA.2: 2
- AVA_VLA.3: 1
- AVA_VLA.4: 1
|
- ACM:
- ACM_AUT: 2
- ACM_AUT.1: 2
- ACM_CAP: 2
- ACM_CAP.4: 2
- ACM_SCP: 2
- ACM_SCP.3: 3
- ADO:
- ADO_DEL: 2
- ADO_DEL.2: 2
- ADO_IGS: 2
- ADO_IGS.1: 2
- ADV:
- ADV_FSP: 2
- ADV_FSP.3: 2
- ADV_HLD: 2
- ADV_HLD.3: 2
- ADV_IMP: 2
- ADV_IMP.2: 1
- ADV_INT: 2
- ADV_INT.1: 2
- ADV_LLD: 2
- ADV_LLD.1: 1
- ADV_RCR: 2
- ADV_RCR.2: 2
- ADV_SPM: 2
- ADV_SPM.3: 2
- AGD:
- AGD_ADM: 4
- AGD_ADM.1: 1
- AGD_USR: 2
- AGD_USR.1: 1
- ALC:
- ALC_DVS: 2
- ALC_DVS.2: 6
- ALC_FLR: 2
- ALC_LCD: 1
- ALC_LCD.2: 3
- ALC_TAT: 2
- ALC_TAT.2: 3
- ASE:
- ASE_DES.1: 1
- ASE_ENV.1: 1
- ASE_INT.1: 1
- ASE_OBJ.1: 1
- ASE_PPC.1: 1
- ASE_REQ.1: 1
- ASE_SRE.1: 1
- ASE_TSS.1: 1
- ATE:
- ATE_COV: 2
- ATE_COV.2: 1
- ATE_DPT: 2
- ATE_DPT.2: 2
- ATE_FUN: 2
- ATE_FUN.1: 1
- ATE_IND: 2
- ATE_IND.2: 1
- AVA:
- AVA_CCA: 2
- AVA_CCA.1: 2
- AVA_MSU: 2
- AVA_MSU.3: 5
- AVA_SOF: 3
- AVA_SOF.1: 1
- AVA_VLA: 4
- AVA_VLA.2: 1
- AVA_VLA.3: 1
- AVA_VLA.4: 6
|
| pdf_data/report_keywords/cc_sfr |
- FDP:
- FDP_ACC.1: 2
- FDP_ACF.1: 2
- FDP_IFC.1: 1
- FDP_IFF.1: 1
- FMT:
- FMT_MSA.1: 1
- FMT_MSA.3: 3
- FMT_SMF.1: 1
- FMT_SMR.1: 1
|
- FAU:
- FCS:
- FCS_CKM.1: 1
- FCS_CKM.4: 1
- FCS_COP.1: 1
- FCS_RND.1: 1
- FDP:
- FDP_ACC.1: 1
- FDP_ACF.1: 1
- FDP_IFC.1: 1
- FDP_ITC.1: 1
- FDP_ITC.2: 1
- FDP_ITT.1: 1
- FDP_SDI.1: 1
- FDP_SDI.2: 1
- FMT:
- FMT_LIM.1: 1
- FMT_LIM.2: 1
- FMT_MSA.1: 1
- FMT_MSA.2: 1
- FMT_MSA.3: 1
- FMT_SMF.1: 1
- FPT:
- FPT_FLS.1: 1
- FPT_ITT.1: 1
- FPT_PHP.3: 1
- FPT_SEP.1: 1
- FPT_TST.2: 1
- FRU:
|
| pdf_data/report_keywords/cc_claims |
- A:
- A.ACCESS_CONTROL: 2
- A.COM_PROT: 2
- A.CORRECT_HW: 2
- A.INSTALL: 2
- A.MANAGE: 2
- A.NO_EVIL_ADM: 2
- A.PHYS_PROTECT: 2
- T:
- T.AUTH_DAC: 1
- T.DL_MISUSE: 1
- T.OVERFLOW: 1
- T.SPAM: 1
- T.UNAUTHUSE: 1
- T.UNAUTH_DAC: 1
|
|
| pdf_data/report_keywords/vendor |
- Microsoft:
- Microsoft: 17
- Microsoft Corporation: 6
|
- Infineon:
- Infineon: 18
- Infineon Technologies: 3
- Infineon Technologies AG: 38
- Philips:
|
| pdf_data/report_keywords/eval_facility |
- TUV:
- TÜV Informationstechnik: 5
|
- TUV:
- TÜV Informationstechnik: 4
|
| pdf_data/report_keywords/symmetric_crypto |
|
|
| pdf_data/report_keywords/asymmetric_crypto |
|
|
| pdf_data/report_keywords/pq_crypto |
|
|
| pdf_data/report_keywords/hash_function |
|
|
| pdf_data/report_keywords/crypto_scheme |
|
|
| pdf_data/report_keywords/crypto_protocol |
|
|
| pdf_data/report_keywords/randomness |
|
|
| pdf_data/report_keywords/cipher_mode |
|
|
| pdf_data/report_keywords/ecc_curve |
|
|
| pdf_data/report_keywords/crypto_engine |
|
|
| pdf_data/report_keywords/tls_cipher_suite |
|
|
| pdf_data/report_keywords/crypto_library |
|
|
| pdf_data/report_keywords/vulnerability |
|
|
| pdf_data/report_keywords/side_channel_analysis |
|
- FI:
- Malfunction: 1
- malfunction: 1
- physical tampering: 1
- SCA:
- DPA: 2
- Physical Probing: 1
- physical probing: 1
- side channel: 2
|
| pdf_data/report_keywords/technical_report_id |
|
- BSI:
- BSI 7125: 2
- BSI 7148: 1
- BSI 7149: 1
|
| pdf_data/report_keywords/device_model |
|
|
| pdf_data/report_keywords/tee_name |
|
|
| pdf_data/report_keywords/os_name |
|
|
| pdf_data/report_keywords/cplc_data |
|
|
| pdf_data/report_keywords/ic_data_group |
|
|
| pdf_data/report_keywords/standard_id |
|
- BSI:
- AIS 25: 2
- AIS 26: 3
- AIS 31: 4
- AIS 32: 1
- AIS 34: 3
- AIS 36: 3
- FIPS:
- ISO:
- ISO/IEC 14443: 4
- ISO/IEC 15408:2005: 3
- ISO/IEC15408: 2005: 1
|
| pdf_data/report_keywords/javacard_version |
|
|
| pdf_data/report_keywords/javacard_api_const |
|
|
| pdf_data/report_keywords/javacard_packages |
|
|
| pdf_data/report_keywords/certification_process |
- ConfidentialDocument:
- Technical Report, BSI-DSZ-CC-0284-2005, Version 1, Datum 2005-09-16, TÜV Informationstechnik GmbH (confidential document) [7] Exchange Server 2003 Administration Guide and Exchange Server 2003 product help (part of the: 1
- OutOfScope:
- disabled in the default configuration of Exchange, such as the IMAP4, POP3, and X.400 protocol, are out of scope of the evaluation, too. B-11 BSI-DSZ-CC-0284-2005 Certification Report 5 Architectural Information: 1
- disabled in the default configuration of Exchange, such as the IMAP4, POP3, and X.400 protocol, are out of scope of the evaluation. The relevant Guidance Documentation is delivered together with the software on: 1
- disabled in the default configuration of Exchange, such as the IMAP4, POP3, and X.400 protocol, are out of scope of the evaluation. The security functionality of the TOE comprises access control for mailboxes and: 1
- of Exchange 2003 the components IMAP4, POP3, and X.400 protocol are disabled and therefore out of scope of the evaluation. The TOE runs on the platform Windows Server 2003 operating system (exact: 1
- out of scope: 4
|
- ConfidentialDocument:
- / m1582-e12, SLE66CLX360PE / m1587-e12, SLE66CLX360PEM / m1588-e12, SLE66CLX360PES / m1589-e12 (confidential document) [8] ETR-lite for composition, according to AIS 36, Version 3, 19. January 2007, for the Product: 1
- Certification Report BSI-DSZ-CC-0399-2007 SLE66CLX360PEM / m1588-e12, SLE66CLX360PES / m1589-e12 (confidential document) [9] Smart card IC Platform Protection Profile, Version 1.0, July 2001, BSI registration ID: 1
|
| pdf_data/report_metadata |
- /Author: Federal Office for Information Security (BSI)
- /Company: BSI, Postfach 200363, 53133 Bonn
- /CreationDate: D:20051220074356+01'00'
- /Creator: Acrobat PDFMaker 7.0.5 für Word
- /ModDate: D:20051220075600+01'00'
- /Producer: Acrobat Distiller 7.0.5 (Windows)
- /SourceModified: D:20051220064348
- /Subject: BSI-DSZ-CC-0284-2005
- /Title: Certification Report
- pdf_file_size_bytes: 399534
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 39
|
- /Author: Bundesamt für Sicherheit in der Informationstechnik
- /Company: BSI, Postfach 200363, 53133 Bonn
- /CreationDate: D:20070125141703+01'00'
- /Creator: Acrobat PDFMaker 7.0.7 für Word
- /Keywords: Common Criteria, Certification, Zertifizierung
- /ModDate: D:20070126073240+01'00'
- /Producer: Acrobat Distiller 7.0.5 (Windows)
- /SourceModified: D:20070125124538
- /Title: Certification Report BSI-DSZ-CC-0399-2007
- pdf_file_size_bytes: 334033
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 50
|
| pdf_data/st_filename |
0284b.pdf |
0399b.pdf |
| pdf_data/st_frontpage |
|
|
| pdf_data/st_keywords/cc_cert_id |
|
- DE:
- BSI-DSZ-CC-0266-2005: 1
- BSI-DSZ-CC-0322-2005: 1
|
| pdf_data/st_keywords/cc_protection_profile_id |
|
|
| pdf_data/st_keywords/cc_security_level |
- EAL:
- EAL4: 10
- EAL4 augmented: 5
|
- EAL:
- EAL 5: 4
- EAL 5 augmented: 4
- EAL5: 5
- EAL5 augmented: 2
- EAL5+: 2
|
| pdf_data/st_keywords/cc_sar |
- ACM:
- ACM_AUT.1: 2
- ACM_CAP.3: 3
- ACM_SCP.1: 1
- ACM_SCP.2: 2
- ADO:
- ADO_DEL.2: 2
- ADO_IGS.1: 2
- ADV:
- ADV_FSP.1: 9
- ADV_FSP.2: 2
- ADV_FUN.1: 1
- ADV_HLD.1: 2
- ADV_HLD.2: 3
- ADV_IGS.1: 1
- ADV_IMP.1: 3
- ADV_LLD.1: 4
- ADV_RCR.1: 5
- ADV_SPM.1: 2
- AGD:
- AGD_ADM.1: 3
- AGD_USR.1: 4
- ALC:
- ALC_DVS.1: 3
- ALC_FLR.3: 9
- ALC_LCD.1: 2
- ALC_TAT.1: 3
- ASE:
- ATE:
- ATE_COV.2: 2
- ATE_DPT.1: 1
- ATE_FUN.1: 3
- ATE_IND.2: 2
- AVA:
- AVA_MSU.2: 2
- AVA_SOF.1: 2
- AVA_VLA.2: 3
|
- ACM:
- ACM_AUT.1: 2
- ACM_CAP.4: 1
- ACM_SCP: 3
- ACM_SCP.2: 1
- ACM_SCP.3: 5
- ADO:
- ADO_DEL.2: 2
- ADO_IGS.1: 2
- ADV:
- ADV_FSP: 1
- ADV_FSP.2: 1
- ADV_FSP.3: 5
- ADV_HLD.3: 3
- ADV_IMP.2: 3
- ADV_INT.1: 3
- ADV_LLD.1: 3
- ADV_RCR.2: 3
- ADV_SPM.1: 1
- ADV_SPM.3: 2
- AGD:
- AGD_ADM.1: 2
- AGD_USR.1: 2
- ALC:
- ALC_DVS.2: 4
- ALC_LCD.2: 1
- ALC_TAT.2: 2
- ATE:
- ATE_COV.2: 2
- ATE_DPT.2: 1
- ATE_FUN.1: 2
- ATE_IND.2: 2
- AVA:
- AVA_CCA.1: 2
- AVA_MSU.3: 3
- AVA_SOF: 4
- AVA_SOF.1: 2
- AVA_VLA.4: 4
|
| pdf_data/st_keywords/cc_sfr |
- FDP:
- FDP_ACC.1: 42
- FDP_ACC.1.1: 4
- FDP_ACF.1: 40
- FDP_ACF.1.1: 3
- FDP_ACF.1.2: 3
- FDP_ACF.1.3: 3
- FDP_ACF.1.4: 3
- FDP_IFC.1: 25
- FDP_IFC.1.1: 1
- FDP_IFF.1: 20
- FDP_IFF.1.1: 1
- FDP_IFF.1.2: 1
- FDP_IFF.1.3: 2
- FDP_IFF.1.4: 1
- FDP_IFF.1.5: 1
- FDP_IFF.1.6: 1
- FIA:
- FIA_ATD.1: 7
- FIA_ATD.1.1: 1
- FIA_UAU.1: 1
- FIA_UAU.2: 7
- FIA_UAU.2.1: 1
- FIA_UID.1: 5
- FIA_UID.2: 8
- FIA_UID.2.1: 1
- FMT:
- FMT_ACC.1: 1
- FMT_MOF.1: 9
- FMT_MOF.1.1: 1
- FMT_MSA.1: 28
- FMT_MSA.1.1: 3
- FMT_MSA.3: 52
- FMT_MSA.3.1: 3
- FMT_MSA.3.2: 3
- FMT_SMF.1: 21
- FMT_SMF.1.1: 1
- FMT_SMR.1: 34
- FMT_SMR.1.1: 2
- FMT_SMR.1.2: 2
- FRU:
- FRU_RSA.1: 18
- FRU_RSA.1.1: 2
- FTP:
- FTP_TRP.1: 7
- FTP_TRP.1.1: 1
- FTP_TRP.1.2: 1
- FTP_TRP.1.3: 1
|
- FAU:
- FCS:
- FCS_CKM.1: 13
- FCS_CKM.1.1: 1
- FCS_CKM.2: 1
- FCS_CKM.4: 12
- FCS_CKM.4.1: 1
- FCS_COP.1: 19
- FCS_COP.1.1: 1
- FCS_RND: 2
- FCS_RND.1: 4
- FCS_RND.1.1: 1
- FDP:
- FDP_ACC.1: 19
- FDP_ACC.1.1: 1
- FDP_ACF.1: 15
- FDP_ACF.1.1: 1
- FDP_ACF.1.2: 1
- FDP_ACF.1.3: 1
- FDP_ACF.1.4: 1
- FDP_IFC.1: 8
- FDP_ITC.1: 12
- FDP_ITC.1.1: 1
- FDP_ITC.1.2: 1
- FDP_ITC.1.3: 1
- FDP_ITC.2: 11
- FDP_ITC.2.1: 1
- FDP_ITC.2.2: 1
- FDP_ITC.2.3: 1
- FDP_ITC.2.4: 1
- FDP_ITC.2.5: 1
- FDP_ITT.1: 3
- FDP_SDI.1: 17
- FDP_SDI.1.1: 1
- FDP_SDI.2: 15
- FDP_SDI.2.2: 1
- FMT:
- FMT_LIM.1: 4
- FMT_LIM.2: 4
- FMT_MSA.1: 13
- FMT_MSA.1.1: 1
- FMT_MSA.2: 11
- FMT_MSA.2.1: 1
- FMT_MSA.3: 14
- FMT_MSA.3.1: 1
- FMT_MSA.3.2: 1
- FMT_SMF.1: 8
- FMT_SMF.1.1: 1
- FMT_SMR.1: 7
- FPT:
- FPT_AMT.1: 4
- FPT_FLS.1: 6
- FPT_ITT.1: 3
- FPT_PHP.3: 7
- FPT_SEP.1: 6
- FPT_TDC.1: 1
- FPT_TST: 2
- FPT_TST.1: 11
- FPT_TST.2: 26
- FPT_TST.2.1: 2
- FRU:
- FTP:
- FTP_ITC.1: 1
- FTP_TRP.1: 1
|
| pdf_data/st_keywords/cc_claims |
- A:
- A.ACCESS_CONTROL: 3
- A.COM_PROT: 3
- A.CORRECT_HW: 3
- A.INSTALL: 4
- A.MANAGE: 4
- A.NO_EVIL_ADM: 2
- A.NO_EVIL_ADMIN: 1
- A.PHYS_PROTECT: 4
- O:
- O.CONBLK: 13
- O.DAC: 16
- O.FILTER_EMAIL: 10
- O.QUOTA: 12
- O.RESTDIST: 11
- OE:
- OE.COM_PROT: 5
- OE.DAC: 12
- OE.INSTALL: 3
- OE.PHYSICAL: 3
- OE.PLATFORM_: 1
- OE.PLATFORM_SUPPORT: 4
- T:
- T.AUTH_DAC: 4
- T.DL_MISUSE: 4
- T.OVERFLOW: 4
- T.SPAM: 9
- T.UNAUTHUSE: 3
- T.UNAUTH_DAC: 3
|
|
| pdf_data/st_keywords/vendor |
- Microsoft:
- Microsoft: 20
- Microsoft Corporation: 2
|
- Infineon:
- Infineon: 2
- Infineon Technologies AG: 8
|
| pdf_data/st_keywords/eval_facility |
|
|
| pdf_data/st_keywords/symmetric_crypto |
|
|
| pdf_data/st_keywords/asymmetric_crypto |
|
|
| pdf_data/st_keywords/pq_crypto |
|
|
| pdf_data/st_keywords/hash_function |
|
|
| pdf_data/st_keywords/crypto_scheme |
|
|
| pdf_data/st_keywords/crypto_protocol |
|
|
| pdf_data/st_keywords/randomness |
|
|
| pdf_data/st_keywords/cipher_mode |
|
|
| pdf_data/st_keywords/ecc_curve |
|
|
| pdf_data/st_keywords/crypto_engine |
|
|
| pdf_data/st_keywords/tls_cipher_suite |
|
|
| pdf_data/st_keywords/crypto_library |
|
|
| pdf_data/st_keywords/vulnerability |
|
|
| pdf_data/st_keywords/side_channel_analysis |
|
- FI:
- DFA: 2
- Malfunction: 15
- malfunction: 3
- SCA:
- DPA: 4
- Leak-Inherent: 10
- Physical Probing: 2
- SPA: 2
- other:
|
| pdf_data/st_keywords/technical_report_id |
|
|
| pdf_data/st_keywords/device_model |
|
|
| pdf_data/st_keywords/tee_name |
|
|
| pdf_data/st_keywords/os_name |
|
|
| pdf_data/st_keywords/cplc_data |
|
|
| pdf_data/st_keywords/ic_data_group |
|
|
| pdf_data/st_keywords/standard_id |
- CC:
- CCIMB-99-031: 1
- CCIMB-99-032: 1
- CCIMB-99-033: 1
- RFC:
- RFC1725: 1
- RFC1730: 1
- RFC821: 11
|
- BSI:
- CC:
- CCMB-2005-08-001: 1
- CCMB-2005-08-002: 1
- CCMB-2005-08-003: 2
- FIPS:
- ISO:
- ISO/IEC 7816: 2
- ISO/IEC 7816-3: 1
|
| pdf_data/st_keywords/javacard_version |
|
|
| pdf_data/st_keywords/javacard_api_const |
|
|
| pdf_data/st_keywords/javacard_packages |
|
|
| pdf_data/st_keywords/certification_process |
- OutOfScope:
- disabled in the default configuration of Exchange, such as the IMAP4, POP3, and X.400 protocol, are out of scope of the evaluation. The security functionality of the TOE comprises access control for mailboxes and: 1
- out of scope: 2
- the TOE is Exchange in its default configuration, IMAP4, POP3, and X.400 protocols are disabled and out of scope in the evaluation. Security Target Page 9/64 1. Admin component, which includes the following: 1
|
- OutOfScope:
- out of scope: 1
- single DES is out of scope of the evaluation: 1
- smart card applications • Data encryption according to single-DES and 3DES standard (single DES is out of scope of the evaluation) • The ACE module allowing for data encryption according to RSA standard with 512: 1
|
| pdf_data/st_metadata |
- /Author: slabihou
- /CreationDate: D:20050713145508+02'00'
- /Creator: pdfFactory Pro www.pdffactory.com
- /Producer: pdfFactory Pro 2.41 (Windows 2000 Professional German)
- /Title: MS_EX_ST_1.9.doc
- pdf_file_size_bytes: 285736
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 64
|
- /Author:
- /CreationDate: D:20061211103752+01'00'
- /Creator: pdfFactory Pro www.pdffactory.com
- /Producer: pdfFactory Pro 2.42 (Windows XP Professional German)
- /Title: SLE66CLX800PEx+360PEx_SecurityTarget_1.3_ohne_RSA.doc
- pdf_file_size_bytes: 269072
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 52
|
| state/cert/convert_garbage |
None |
None |
| state/cert/convert_ok |
False |
False |
| state/cert/download_ok |
False |
False |
| state/cert/extract_ok |
False |
False |
| state/cert/pdf_hash |
Equal |
Equal |
| state/cert/txt_hash |
Equal |
Equal |
| state/report/convert_garbage |
None |
None |
| state/report/convert_ok |
True |
True |
| state/report/download_ok |
True |
True |
| state/report/extract_ok |
True |
True |
| state/report/pdf_hash |
Different |
Different |
| state/report/txt_hash |
Different |
Different |
| state/st/convert_garbage |
None |
None |
| state/st/convert_ok |
True |
True |
| state/st/download_ok |
True |
True |
| state/st/extract_ok |
True |
True |
| state/st/pdf_hash |
Different |
Different |
| state/st/txt_hash |
Different |
Different |