Home    |    View Topics    |    Search    |    Contact Us    |   



Category:   Application (Security)  >   RSA BSAFE Micro Edition Suite Vendors:   RSA
RSA BSAFE Micro Edition Suite Weak Signature Support Allows Weak Signature Algorithm Negotiation and Exposes Users to Hash Collision Forgery Attacks
SecurityTracker Alert ID:  1036835
SecurityTracker URL:
CVE Reference:   CVE-2016-0923, CVE-2016-0924   (Links to External Site)
Date:  Sep 15 2016
Impact:   Disclosure of system information, Modification of system information
Fix Available:  Yes  Vendor Confirmed:  Yes  
Version(s): 4.0.x prior to 4.0.9; 4.1.x prior to 4.1.5
Description:   Two vulnerabilities were reported in RSA BSAFE Micro Edition Suite. A remote user can conduct hash collision forgery attacks. A remote user can cause a weak signature algorithm to be negotiated.

The system presents the signature algorithm list in the incorrect order. As a result, the connection may use a weak signature algorithm [CVE-2016-0923].

The system allows the use of obsolete server signatures (e.g., MD5) in a TLS 1.2 ServerKeyExchange message. As a result, the system may be subject to hash collision forgery attacks [CVE-2016-0924]. This type of attack is known as a SLOTH attack.

RSA BSAFE SSL-C is not affected by these vulnerabilities.

Impact:   A remote user can conduct hash collision forgery attacks.

The system may use a weak signature algorithm.

Solution:   The vendor has issued a fix (4.0.9, 4.1.5; Advisory ESA-2016-094).
Vendor URL: (Links to External Site)
Cause:   State error

Message History:   None.

 Source Message Contents

[Original Message Not Available for Viewing]

Go to the Top of This SecurityTracker Archive Page

Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2020, LLC