Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2024-34447

Опубликовано: 03 мая 2024
Источник: debian
EPSS Низкий

Описание

An issue was discovered in the Bouncy Castle Crypto Package For Java before BC TLS Java 1.0.19 (ships with BC Java 1.78, BC Java (LTS) 2.73.6) and before BC FIPS TLS Java 1.0.19. When endpoint identification is enabled in the BCJSSE and an SSL socket is created without an explicit hostname (as happens with HttpsURLConnection), hostname verification could be performed against a DNS-resolved IP address in some situations, opening up a possibility of DNS poisoning.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
bouncycastlefixed1.80-1package
bouncycastleno-dsabookwormpackage
bouncycastleno-dsabullseyepackage
bouncycastlepostponedbusterpackage

Примечания

  • https://github.com/bcgit/bc-java/wiki/CVE%E2%80%902024%E2%80%9034447

  • https://github.com/bcgit/bc-java/commit/c47f6444a744396135322784b5fea1d35d46a8a7 (r1rv78v1)

  • https://github.com/bcgit/bc-java/issues/1656

EPSS

Процентиль: 45%
0.00227
Низкий

Связанные уязвимости

CVSS3: 7.5
ubuntu
почти 2 года назад

An issue was discovered in the Bouncy Castle Crypto Package For Java before BC TLS Java 1.0.19 (ships with BC Java 1.78, BC Java (LTS) 2.73.6) and before BC FIPS TLS Java 1.0.19. When endpoint identification is enabled in the BCJSSE and an SSL socket is created without an explicit hostname (as happens with HttpsURLConnection), hostname verification could be performed against a DNS-resolved IP address in some situations, opening up a possibility of DNS poisoning.

CVSS3: 5.3
redhat
почти 2 года назад

An issue was discovered in the Bouncy Castle Crypto Package For Java before BC TLS Java 1.0.19 (ships with BC Java 1.78, BC Java (LTS) 2.73.6) and before BC FIPS TLS Java 1.0.19. When endpoint identification is enabled in the BCJSSE and an SSL socket is created without an explicit hostname (as happens with HttpsURLConnection), hostname verification could be performed against a DNS-resolved IP address in some situations, opening up a possibility of DNS poisoning.

CVSS3: 7.5
nvd
почти 2 года назад

An issue was discovered in the Bouncy Castle Crypto Package For Java before BC TLS Java 1.0.19 (ships with BC Java 1.78, BC Java (LTS) 2.73.6) and before BC FIPS TLS Java 1.0.19. When endpoint identification is enabled in the BCJSSE and an SSL socket is created without an explicit hostname (as happens with HttpsURLConnection), hostname verification could be performed against a DNS-resolved IP address in some situations, opening up a possibility of DNS poisoning.

CVSS3: 5.9
github
почти 2 года назад

Bouncy Castle Java Cryptography API vulnerable to DNS poisoning

EPSS

Процентиль: 45%
0.00227
Низкий