Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2016-1000342

Опубликовано: 04 июн. 2018
Источник: debian

Описание

In the Bouncy Castle JCE Provider version 1.55 and earlier ECDSA does not fully validate ASN.1 encoding of signature on verification. It is possible to inject extra elements in the sequence making up the signature and still have it validate, which in some cases may allow the introduction of 'invisible' data into a signed structure.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
bouncycastlefixed1.56-1package

Примечания

  • https://github.com/bcgit/bc-java/commit/843c2e60f67d71faf81d236f448ebbe56c62c647#diff-25c3c78db788365f36839b3f2d3016b9

Связанные уязвимости

CVSS3: 7.5
ubuntu
больше 7 лет назад

In the Bouncy Castle JCE Provider version 1.55 and earlier ECDSA does not fully validate ASN.1 encoding of signature on verification. It is possible to inject extra elements in the sequence making up the signature and still have it validate, which in some cases may allow the introduction of 'invisible' data into a signed structure.

CVSS3: 5.1
redhat
больше 7 лет назад

In the Bouncy Castle JCE Provider version 1.55 and earlier ECDSA does not fully validate ASN.1 encoding of signature on verification. It is possible to inject extra elements in the sequence making up the signature and still have it validate, which in some cases may allow the introduction of 'invisible' data into a signed structure.

CVSS3: 7.5
nvd
больше 7 лет назад

In the Bouncy Castle JCE Provider version 1.55 and earlier ECDSA does not fully validate ASN.1 encoding of signature on verification. It is possible to inject extra elements in the sequence making up the signature and still have it validate, which in some cases may allow the introduction of 'invisible' data into a signed structure.

CVSS3: 7.5
github
больше 7 лет назад

In Bouncy Castle JCE Provider ECDSA does not fully validate ASN.1 encoding of signature on verification

suse-cvrf
больше 7 лет назад

Security update for bouncycastle