EMC RSA BSAFE Crypto-J versions prior to 6.2.2 has a PKCS#12 Timing Attack Vulnerability. A possible timing attack could be carried out by modifying a PKCS#12 file that has an integrity MAC for which the password is not known. An attacker could then feed the modified PKCS#12 file to the toolkit and guess the current MAC one byte at a time. This is possible because Crypto-J uses a non-constant-time method to compare the stored MAC with the calculated MAC. This vulnerability is similar to the issue described in CVE-2015-2601.
References
Link | Resource |
---|---|
http://www.securityfocus.com/archive/1/540066/30/0/threaded | Mailing List Third Party Advisory VDB Entry |
http://www.securityfocus.com/bid/95831 | Third Party Advisory VDB Entry |
http://www.securitytracker.com/id/1037732 | Third Party Advisory VDB Entry |
Configurations
History
16 Dec 2021, 18:44
Type | Values Removed | Values Added |
---|---|---|
References | (CONFIRM) http://www.securityfocus.com/archive/1/540066/30/0/threaded - Mailing List, Third Party Advisory, VDB Entry | |
References | (SECTRACK) http://www.securitytracker.com/id/1037732 - Third Party Advisory, VDB Entry | |
CVSS |
v2 : v3 : |
v2 : 4.3
v3 : 3.7 |
30 Nov 2021, 18:56
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:dell:bsafe_crypto-j:*:*:*:*:*:*:*:* |
Information
Published : 2017-02-03 07:59
Updated : 2024-02-04 19:11
NVD link : CVE-2016-8217
Mitre link : CVE-2016-8217
CVE.ORG link : CVE-2016-8217
JSON object : View
Products Affected
dell
- bsafe_crypto-j
CWE
CWE-200
Exposure of Sensitive Information to an Unauthorized Actor