First published: Tue Feb 18 2014(Updated: )
The (1) JSAFE and (2) JSSE APIs in EMC RSA BSAFE SSL-J 5.x before 5.1.3 and 6.x before 6.0.2 make it easier for remote attackers to bypass intended cryptographic protection mechanisms by triggering application-data processing during the TLS handshake, a time at which the data is both unencrypted and unauthenticated.
Credit: security_alert@emc.com
Affected Software | Affected Version | How to fix |
---|---|---|
EMC RSA BSAFE SSL-J | =5.1.2 | |
EMC RSA BSAFE SSL-J | =6.0 | |
EMC RSA BSAFE Toolkits | =5.0 | |
EMC RSA BSAFE Toolkits | =5.1.0 | |
EMC RSA BSAFE Toolkits | =5.1.1 | |
EMC RSA BSAFE Toolkits | =6.0.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2014-0626 has a high severity rating due to its potential to allow remote attackers to bypass cryptographic protections.
To fix CVE-2014-0626, upgrade to EMC RSA BSAFE SSL-J version 5.1.3 or later, or version 6.0.2 or later.
Affected versions of EMC RSA BSAFE SSL-J include 5.0, 5.1.0, 5.1.1, 5.1.2, 6.0, and 6.0.1.
CVE-2014-0626 is vulnerable to cryptographic protection bypass attacks during the TLS handshake.
There is no official workaround for CVE-2014-0626, so upgrading to fixed versions is strongly recommended.