Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
Microsoft SQL Server 2014 Database Engine Enterprise Edition x64 (English)12.0.2000.8
JISEC-CC-CRP-C0475
McAfee VirusScan Enterprise v8.5i and McAfee ePolicy Orchestrator v3.6
CCEVS-VR-0047-2007
name Microsoft SQL Server 2014 Database Engine Enterprise Edition x64 (English)12.0.2000.8 McAfee VirusScan Enterprise v8.5i and McAfee ePolicy Orchestrator v3.6
category Databases Other Devices and Systems
scheme JP US
not_valid_after 01.07.2020 06.09.2012
not_valid_before 16.06.2015 22.06.2007
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0475_erpt.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10166-vr.pdf
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0475_est.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10166-st.pdf
manufacturer Microsoft Corporation McAfee, Inc.
manufacturer_web https://www.microsoft.com https://www.mcafee.com/
dgst c225189611bed8f2 d51744cd80325e5d
heuristics/cert_id JISEC-CC-CRP-C0475 CCEVS-VR-0047-2007
heuristics/cert_lab [] US
heuristics/cpe_matches {} cpe:2.3:a:mcafee:epolicy_orchestrator:3.6.0:*:*:*:*:*:*:*, cpe:2.3:a:mcafee:virusscan_enterprise:8.5i:*:*:*:*:*:*:*, cpe:2.3:a:mcafee:epolicy_orchestrator:3.6.1:*:*:*:*:*:*:*
heuristics/related_cves {} CVE-2021-23889, CVE-2020-13938, CVE-2007-1498, CVE-2023-3946, CVE-2021-31834, CVE-2013-0141, CVE-2022-3338, CVE-2021-2432, CVE-2017-3980, CVE-2020-7317, CVE-2010-3496, CVE-2015-0922, CVE-2006-5274, CVE-2019-3604, CVE-2023-5444, CVE-2022-0862, CVE-2015-8577, CVE-2022-0858, CVE-2021-3712, CVE-2020-7337, CVE-2009-1348, CVE-2015-8765, CVE-2013-0140, CVE-2021-30639, CVE-2015-0921, CVE-2022-0861, CVE-2021-23840, CVE-2021-2161, CVE-2004-0095, CVE-2009-5118, CVE-2013-4882, CVE-2015-4559, CVE-2021-23890, CVE-2022-0842, CVE-2023-5445, CVE-2014-2205, CVE-2022-0859, CVE-2021-31835, CVE-2021-33037, CVE-2012-4594, CVE-2022-0857, CVE-2007-1538, CVE-2022-3339, CVE-2010-5143, CVE-2013-4883, CVE-2021-23888
heuristics/extracted_sars ALC_CMS.2, ALC_DEL.1, ATE_IND.2, ATE_COV.1, ADV_ARC.1, AVA_VAN.2, ADV_FSP.2, ALC_FLR.2, AGD_PRE.1 ADV_RCR.1, ADV_FSP.1, ATE_FUN.1, AGD_USR.1, AVA_VLA.1, AVA_MSU.1, AGD_ADM.1, ATE_COV.1, ATE_IND.2, ADV_HLD.1, AVA_SOF.1, ALC_FLR.2
heuristics/extracted_versions 12.0.2000.8 3.6, 8.5
heuristics/scheme_data
  • cert_id: JISEC-CC-CRP-C0475
  • certification_date: 01.06.2015
  • claim: EAL2+ ALC_FLR.2 PP
  • enhanced:
    • assurance_level: EAL2 Augmented with ALC_FLR.2
    • cc_version: 3.1 Release4
    • cert_link: https://www.ipa.go.jp/en/security/c0475_eimg.pdf
    • description: PRODUCT DESCRIPTION Description of TOE The TOE is the database engine of SQL Server 2014. SQL Server is a Database Management System (DBMS). The TOE has been developed as the core module of the DBMS to store and manage data in a secure way. TOE security functionality This TOE provides the following security functionality: - The Access Control function of the TOE controls the access of users to user data and metadata stored in the TOE. - The Session Handling function of the TOE limits the possibilities of users to establish sessions with the TOE. - The Security Audit function of the TOE produces log files about all security relevant events. - The Security Management function allows authorized administrators to manage the behavior of the security functionality of the TOE. - The Identification and Authentication function of the TOE is able to identify and authenticate users. - The Residual Information Protection function of the TOE overwrites the residual information on the memory that will be used for user sessions.
    • evaluation_facility: TÜV Informationstechnik GmbH, Evaluation Body for IT-Security
    • product: Microsoft SQL Server 2014 Database Engine Enterprise Edition x64 (English)
    • product_type: Database Management System (DBMS)
    • protection_profile: U.S. Government Protection Profile for Database Management Systems, Version 1.3
    • report_link: https://www.ipa.go.jp/en/security/c0475_erpt.pdf
    • target_link: https://www.ipa.go.jp/en/security/c0475_est.pdf
    • toe_version: 12.0.2000.8
    • vendor: Microsoft Corporation
  • expiration_date: 01.07.2020
  • supplier: Microsoft Corporation
  • toe_japan_name: -----
  • toe_overseas_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0475_it3480.html
  • toe_overseas_name: Microsoft SQL Server 2014 Database Engine Enterprise Edition x64 (English)12.0.2000.8
  • category: AntiVirus
  • certification_date: 22.06.2007
  • evaluation_facility: COACT, Inc. Labs
  • expiration_date:
  • id: CCEVS-VR-VID10166
  • product: McAfee VirusScan Enterprise v8.5i and McAfee ePolicy Orchestrator v3.6
  • scheme: US
  • url: https://www.niap-ccevs.org/product/10166
  • vendor: McAfee, LLC
heuristics/protection_profiles 61018742063aaca9 778d5ae70dd6435b
protection_profile_links https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp_dbms_v1.3.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/PP_AV_BR_V1.1.pdf
pdf_data/report_filename c0475_erpt.pdf st_vid10166-vr.pdf
pdf_data/report_frontpage
  • US:
  • US:
    • cert_id: CCEVS-VR-07-0047
    • cert_item: McAfee VirusScan 8.5i and ePolicy Orchestrator 3.6.1
    • cert_lab: US NIAP
pdf_data/report_keywords/cc_cert_id
  • JP:
    • CRP-C0475-01: 1
    • Certification No. C0475: 1
  • US:
    • CCEVS-VR-07-0047: 1
pdf_data/report_keywords/cc_security_level
  • EAL:
    • EAL2: 4
    • EAL2 augmented: 3
    • EAL2+: 2
  • EAL:
    • EAL 2: 2
    • EAL 2 augmented: 2
    • EAL 4: 1
    • EAL2: 3
    • EAL2 augmented: 3
pdf_data/report_keywords/cc_sar
  • ALC:
    • ALC_FLR.2: 4
  • ALC:
    • ALC_FLR.2: 5
pdf_data/report_keywords/cc_claims
  • A:
    • A.NO_EVIL: 1
    • A.NO_GENERAL_: 1
    • A.PHYSICAL: 1
  • T:
    • T.ACCIDENTIAL_ADMIN_ERROR: 1
    • T.MASQUERADE: 1
    • T.POOR_DESIGN: 1
    • T.POOR_IMPLEMENTATION: 1
    • T.POOR_TEST: 1
    • T.RESIDUAL_DATA: 1
    • T.TSF_COMPROMISE: 1
    • T.UNAUTHORIZED_: 1
    • T.UNIDENTIFIED_: 1
  • A:
    • A.PHYSICAL: 1
  • T:
    • T.ACCIDENTAL_ADMIN_ERROR: 1
    • T.AUDIT_: 1
    • T.MASQUERADE: 1
    • T.POOR_DESIGN: 1
    • T.POOR_IMPLEMENTATION: 1
    • T.POOR_TEST: 1
    • T.RESIDUAL_DATA: 1
    • T.TSF_COMPROMISE: 1
    • T.UNATTENDED_SESSION: 1
    • T.UNIDENTIFIED_ACTIONS: 1
    • T.VIRUS: 1
pdf_data/report_keywords/vendor
  • Microsoft:
    • Microsoft: 20
    • Microsoft Corporation: 7
  • Microsoft:
    • Microsoft: 10
pdf_data/report_keywords/eval_facility
  • TUV:
    • TÜV Informationstechnik: 4
pdf_data/report_keywords/symmetric_crypto
  • AES_competition:
    • RC:
      • RC2: 1
  • DES:
    • 3DES:
      • 3DES: 1
pdf_data/report_keywords/asymmetric_crypto
  • FF:
    • DSA:
      • DSA: 1
pdf_data/report_keywords/standard_id
  • CC:
    • CCMB-2012-09-001: 2
    • CCMB-2012-09-002: 2
    • CCMB-2012-09-003: 2
    • CCMB-2012-09-004: 2
pdf_data/report_metadata
  • /CreationDate: D:20150724094408+09'00'
  • /Creator: Microsoft® Word 2010
  • /ModDate: D:20150724094442+09'00'
  • /Producer: Microsoft® Word 2010
  • pdf_file_size_bytes: 233021
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: True
  • pdf_number_of_pages: 31
  • /Author: Jerome F. Myers
  • /Company: The Aerospace Corporation
  • /CreationDate: D:20070717151740-04'00'
  • /Creator: Acrobat PDFMaker 7.0 for Word
  • /ModDate: D:20070717151821-04'00'
  • /Producer: Acrobat Distiller 7.0 (Windows)
  • /SourceModified: D:20070717191708
  • /Title: National Information Assurance Partnership
  • /_AdHocReviewCycleID: -2067643838
  • /_AuthorEmail: [email protected]
  • /_AuthorEmailDisplayName: Dignan, David M.
  • /_EmailSubject: Validation Report for vid10166
  • /_PreviousAdHocReviewCycleID: 819936599
  • pdf_file_size_bytes: 174038
  • pdf_hyperlinks: http://www.osvdb.org/, http://nvd.nist.gov/, http://www.securityfocus.com/, http://archives.neohapsis.com/, http://www.cert.org/
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 18
pdf_data/st_filename c0475_est.pdf st_vid10166-st.pdf
pdf_data/st_keywords/cc_security_level
  • EAL:
    • EAL 2: 3
    • EAL 2 augmented: 1
    • EAL2: 2
    • EAL2 augmented: 2
    • EAL2+: 51
  • EAL:
    • EAL2: 6
    • EAL2 augmented: 5
pdf_data/st_keywords/cc_sar
  • ADV:
    • ADV_ARC.1: 2
    • ADV_FSP.2: 1
  • AGD:
    • AGD_ADD: 3
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMS.2: 1
    • ALC_DEL.1: 1
    • ALC_FLR: 1
    • ALC_FLR.2: 4
  • ATE:
    • ATE_COV.1: 1
    • ATE_IND.2: 1
  • AVA:
    • AVA_VAN.2: 1
  • ACM:
    • ACM_CAP.2: 5
  • ADO:
    • ADO_DEL.1: 5
    • ADO_IGS.1: 4
  • ADV:
    • ADV_FSP.1: 4
    • ADV_HLD.1: 4
    • ADV_RCR.1: 5
  • AGD:
    • AGD_ADM.1: 5
    • AGD_USR.1: 3
  • ALC:
    • ALC_FLR.2: 10
  • ATE:
    • ATE_COV.1: 5
    • ATE_FUN.1: 3
    • ATE_IND.2: 5
  • AVA:
    • AVA_MSU.1: 5
    • AVA_SOF.1: 2
    • AVA_VLA.1: 6
pdf_data/st_keywords/cc_sfr
  • FAU:
    • FAU_GEN: 10
    • FAU_GEN.1: 3
    • FAU_GEN.2: 8
    • FAU_GEN.2.1: 1
    • FAU_SEL: 8
    • FAU_SEL.1: 2
    • FAU_STG: 3
    • FAU_STG.1: 2
    • FAU_STG.3: 1
    • FAU_STG.4: 1
    • FAU_STG_EXP: 2
    • FAU_STG_EXP.5: 15
    • FAU_STG_EXP.5.1: 2
  • FDP:
    • FDP_ACC.1: 10
    • FDP_ACC.1.1: 1
    • FDP_ACF: 8
    • FDP_ACF.1: 6
    • FDP_IFC.1: 1
    • FDP_RIP.1: 6
    • FDP_RIP.1.1: 1
  • FIA:
    • FIA_ATD.1: 10
    • FIA_ATD.1.1: 2
    • FIA_UAU.2: 8
    • FIA_UAU.2.1: 1
    • FIA_UAU.5: 8
    • FIA_UAU.5.1: 1
    • FIA_UAU.5.2: 1
    • FIA_UID.1: 11
    • FIA_UID.2: 12
    • FIA_UID.2.1: 1
  • FMT:
    • FMT_MOF.1: 6
    • FMT_MOF.1.1: 1
    • FMT_MSA.1: 6
    • FMT_MSA.1.1: 1
    • FMT_MSA.3: 8
    • FMT_MSA.3.1: 1
    • FMT_MSA.3.2: 1
    • FMT_MTD.1: 7
    • FMT_MTD.1.1: 1
    • FMT_REV.1: 16
    • FMT_REV.1.1: 2
    • FMT_REV.1.2: 2
    • FMT_SMF.1: 7
    • FMT_SMF.1.1: 1
    • FMT_SMR.1: 14
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
  • FPT:
    • FPT_STM.1: 1
    • FPT_TRC.1: 6
    • FPT_TRC.1.1: 1
    • FPT_TRC.1.2: 1
  • FTA:
    • FTA_MCS.1: 6
    • FTA_MCS.1.1: 1
    • FTA_MCS.1.2: 1
    • FTA_TAH.1: 8
    • FTA_TAH.1.1: 1
    • FTA_TAH.1.2: 1
    • FTA_TAH.1.3: 1
    • FTA_TSE.1: 6
    • FTA_TSE.1.1: 1
  • FAU:
    • FAU_ARP.1: 1
    • FAU_GEN: 21
    • FAU_GEN.1: 5
    • FAU_GEN.2: 1
    • FAU_SAR.1: 13
    • FAU_SAR.1.1: 2
    • FAU_SAR.1.2: 2
    • FAU_SAR.2: 8
    • FAU_SAR.2.1: 1
    • FAU_SAR.3: 10
    • FAU_SAR.3.1: 1
    • FAU_STG: 29
    • FAU_STG.1: 6
    • FAU_STG.4: 1
  • FCS:
    • FCS_CKM.1: 2
    • FCS_CKM.4: 2
    • FCS_COP.1: 8
    • FCS_COP.1.1: 1
  • FDP:
    • FDP_ACF: 1
    • FDP_ACT: 1
    • FDP_IFF: 2
    • FDP_ITC.1: 2
    • FDP_ITC.2: 1
    • FDP_RIP.1: 3
    • FDP_RIP.1.1: 1
    • FDP_RIP.2: 1
  • FIA:
    • FIA_AFL.1: 4
    • FIA_AFL.1.1: 1
    • FIA_AFL.1.2: 1
    • FIA_SOS.1: 4
    • FIA_SOS.1.1: 1
    • FIA_UAU.2: 4
    • FIA_UAU.2.1: 1
    • FIA_UAU.6: 4
    • FIA_UAU.6.1: 1
    • FIA_UID.1: 2
    • FIA_UID.2: 4
    • FIA_UID.2.1: 1
  • FMT:
    • FMT_MOF.1: 13
    • FMT_MOF.1.1: 2
    • FMT_MSA.2: 2
    • FMT_MTD.1: 9
    • FMT_MTD.1.1: 3
    • FMT_SMF.1: 11
    • FMT_SMF.1.1: 1
    • FMT_SMR.1: 11
    • FMT_SMR.1.1: 1
  • FPT:
    • FPT_ITT.1: 4
    • FPT_RVM.1: 3
    • FPT_SEP: 5
    • FPT_SEP.1: 4
    • FPT_SEP.1.1: 1
    • FPT_SEP.1.2: 1
    • FPT_SEP_EXP: 1
    • FPT_SEP_EXP.1: 10
    • FPT_SEP_EXP.1.2: 1
    • FPT_STM.1: 5
  • FTA:
    • FTA_SSL.1: 4
    • FTA_SSL.1.1: 1
    • FTA_SSL.1.2: 1
    • FTA_TAB.1: 4
    • FTA_TAB.1.1: 1
  • FTP:
    • FTP_ITT.1.1: 1
    • FTP_RVM.1: 1
    • FTP_RVM.1.1: 1
    • FTP_STM.1.1: 1
pdf_data/st_keywords/cc_claims
  • A:
    • A.NO_EVIL: 3
    • A.NO_GENERAL_PURPOSE: 3
    • A.PHYSICAL: 3
  • O:
    • O.ACCESS_HISTORY: 5
    • O.ADMIN_GUIDANCE: 1
    • O.ADMIN_ROLE: 4
    • O.AUDIT_: 1
    • O.AUDIT_GENERATION: 4
    • O.CONFIGURATION_IDENTIFICATION: 1
    • O.DOCUMENTED_DESIGN: 1
    • O.INTERNAL_TOE_DOMAINS: 1
    • O.MANAGE: 6
    • O.MEDIATE: 5
    • O.PARTIAL_FUNCTIONAL_TEST: 1
    • O.PARTIAL_SELF_PROTECTION: 1
    • O.RESIDUAL_INFORM: 1
    • O.RESIDUAL_INFORMAT: 2
    • O.RESIDUAL_INFORMATION: 3
    • O.TOE_ACCESS: 7
    • O.VULNERABILITY_ANALYSIS: 1
  • OE:
    • OE.NO_EVIL: 4
    • OE.NO_GENERAL_: 2
    • OE.NO_GENERAL_PURPOSE: 1
    • OE.PHYSICAL: 4
  • T:
    • T.ACCIDENTIAL_ADMIN_ERROR: 1
    • T.MASQUERADE: 3
    • T.POOR_DESIGN: 1
    • T.POOR_IMPLEMENTATION: 1
    • T.POOR_TEST: 1
    • T.RESIDUAL_DATA: 3
    • T.TSF_COMPROMISE: 3
    • T.UNAUTHORIZED_ACCESS: 3
    • T.UNIDENTIFIED_ACTIONS: 3
  • A:
    • A.AUDIT_BACKUP: 3
    • A.NO_EVIL: 1
    • A.PHYSICAL: 3
    • A.SECURE_COMMS: 2
    • A.SECURE_UPDATES: 3
  • O:
    • O.ADMIN_GUIDANCE: 5
    • O.ADMIN_ROLE: 4
    • O.AUDIT_GEN: 1
    • O.AUDIT_GENERATION: 5
    • O.AUDIT_PROTECT: 2
    • O.AUDIT_PROTECTIO: 1
    • O.AUDIT_PROTECTION: 1
    • O.AUDIT_REVIEW: 5
    • O.CONFIGURATION_I: 1
    • O.CONFIGURATION_IDEN: 2
    • O.CONFIGURATION_IDENTIF: 1
    • O.CONFIGURATION_IDENTIFICATION: 3
    • O.CORRECT_TSF_OP: 1
    • O.CORRECT_TSF_OPERAT: 2
    • O.CORRECT_TSF_OPERATIO: 1
    • O.CORRECT_TSF_OPERATION: 4
    • O.CRYPTOGRAPHY: 4
    • O.DOCUMENTED_DES: 1
    • O.DOCUMENTED_DESIGN: 7
    • O.MANAGE: 5
    • O.PARTIAL_FUNCTIO: 1
    • O.PARTIAL_FUNCTIONAL: 2
    • O.PARTIAL_FUNCTIONAL_TE: 1
    • O.PARTIAL_FUNCTIONAL_TEST: 2
    • O.PARTIAL_FUNCTIONAL_TESTING: 2
    • O.PARTIAL_SELF_PR: 1
    • O.PARTIAL_SELF_PROTEC: 2
    • O.PARTIAL_SELF_PROTECTI: 1
    • O.PARTIAL_SELF_PROTECTION: 3
    • O.VIRUS: 6
    • O.VULNERABILITY_A: 1
    • O.VULNERABILITY_ANALY: 3
    • O.VULNERABILITY_ANALYSI: 1
    • O.VULNERABILITY_ANALYSIS: 1
    • O.VULNERABILITY_ANALYSIS_TEST: 3
  • OE:
    • OE.AUDIT_BACKUP: 3
    • OE.AUDIT_SEARCH: 8
    • OE.AUDIT_STORAGE: 4
    • OE.DISPLAY_BANNER: 5
    • OE.DOMAIN_SEPARATIO: 3
    • OE.DOMAIN_SEPARATION: 6
    • OE.NO_BYPASS: 7
    • OE.NO_EVIL: 3
    • OE.PHYSICAL: 3
    • OE.RESIDUAL_: 1
    • OE.RESIDUAL_INFORMAT: 2
    • OE.RESIDUAL_INFORMATI: 1
    • OE.RESIDUAL_INFORMATIO: 1
    • OE.RESIDUAL_INFORMATION: 4
    • OE.SECURE_COMMS: 5
    • OE.SECURE_UPDATES: 3
    • OE.TIME_STAMPS: 5
    • OE.TOE_ACCESS: 6
    • OE.TRUST_IT: 1
  • T:
    • T.ACCIDENTAL_ADMIN_: 1
    • T.ACCIDENTAL_ADMIN_ERROR: 3
    • T.AUDIT_: 3
    • T.MASQUERADE: 2
    • T.POOR_DESIGN: 2
    • T.POOR_IMPLEMENTATION: 3
    • T.POOR_TEST: 2
    • T.RESIDUAL_DATA: 3
    • T.TSF_COMPROMISE: 2
    • T.UNATTENDED_: 1
    • T.UNATTENDED_SESSION: 2
    • T.UNIDENTIFIED_ACTIONS: 2
    • T.VIRUS: 3
pdf_data/st_keywords/vendor
  • Microsoft:
    • Microsoft: 11
    • Microsoft Corporation: 2
  • Microsoft:
    • Microsoft: 8
pdf_data/st_keywords/symmetric_crypto
  • AES_competition:
    • RC:
      • RC2: 1
  • DES:
    • 3DES:
      • 3DES: 1
pdf_data/st_keywords/asymmetric_crypto
  • FF:
    • DSA:
      • DSA: 1
pdf_data/st_keywords/hash_function
  • SHA:
    • SHA1:
      • SHA-1: 1
  • SHA:
    • SHA1:
      • SHA-1: 3
pdf_data/st_keywords/tee_name
  • IBM:
    • SE: 3
pdf_data/st_keywords/standard_id
  • FIPS:
    • FIPS 140-2: 5
    • FIPS 180-2: 1
pdf_data/st_metadata
  • /Author: User
  • /CreationDate: D:20070619111903-07'00'
  • /Creator: Acrobat PDFMaker 7.0.7 for Word
  • /ModDate: D:20070619144257-04'00'
  • /Producer: Acrobat Distiller 7.0.5 (Windows)
  • /SourceModified: D:20070619181729
  • /Title: SECURITY TARGET
  • pdf_file_size_bytes: 781280
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 65
state/report/pdf_hash Different Different
state/report/txt_hash Different Different
state/st/pdf_hash Different Different
state/st/txt_hash Different Different