RSA BSAFE Crypto-J Bugs Let Remote USers Bypass OCSP Time Validation and Conduct Timing Attacks to Determine PKCS MAC Values
|
SecurityTracker Alert ID: 1037732 |
SecurityTracker URL: http://securitytracker.com/id/1037732
|
CVE Reference:
CVE-2015-2601, CVE-2015-4748, CVE-2016-8212, CVE-2016-8217
(Links to External Site)
|
Date: Jan 27 2017
|
Impact:
Disclosure of authentication information, Modification of system information
|
Fix Available: Yes Vendor Confirmed: Yes
|
Version(s): prior to 6.2.2
|
Description:
Two vulnerabilities were reported in RSA BSAFE Crypto-J. A remote user can bypass security controls on the target system. A remote user can obtain potentially sensitive information on the target system.
The software does not restrict OCSP response validity times when the optional nextUpdate value is not provided [CVE-2016-8212]. As a result, an OCSP response may be considered valid indefinitely.
A remote user can conduct a timing attack by modifying and submitting a PKCS#12 file and monitoring the resulting processing time to determine the valid MAC [CVE-2016-8217].
|
Impact:
A remote user can bypass OCSP time validity restrictions on the target system.
A remote user can determine the valid MAC for PKCS#12 files on the target system.
|
Solution:
The vendor has issued a fix (6.2.2; Advisory ESA-2016-154).
|
Vendor URL: www.emc.com/ (Links to External Site)
|
Cause:
State error
|
|
Message History:
None.
|
Source Message Contents
|
|
[Original Message Not Available for Viewing]
|
|