"product_name":"RSA BSAFE Crypto-J RSA BSAFE Crypto-J versions prior to 6.2.2",
"version":{
"version_data":[
{
"version_value":"RSA BSAFE Crypto-J RSA BSAFE Crypto-J versions prior to 6.2.2"
}
]
}
}
]
},
"vendor_name":"n/a"
}
]
}
},
"data_format":"MITRE",
"data_type":"CVE",
"data_version":"4.0",
"description":{
"description_data":[
{
"lang":"eng",
"value":"EMC RSA BSAFE Crypto-J versions prior to 6.2.2 has a PKCS#12 Timing Attack Vulnerability. A possible timing attack could be carried out by modifying a PKCS#12 file that has an integrity MAC for which the password is not known. An attacker could then feed the modified PKCS#12 file to the toolkit and guess the current MAC one byte at a time. This is possible because Crypto-J uses a non-constant-time method to compare the stored MAC with the calculated MAC. This vulnerability is similar to the issue described in CVE-2015-2601."