Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-4h8f-2wvx-gg5w

Опубликовано: 03 мая 2024
Источник: github
Github: Прошло ревью
CVSS3: 5.9

Описание

Bouncy Castle Java Cryptography API vulnerable to DNS poisoning

An issue was discovered in the Bouncy Castle Crypto Package For Java before BC TLS Java 1.0.19 (ships with BC Java 1.78, BC Java (LTS) 2.73.6) and before BC FIPS TLS Java 1.0.19. When endpoint identification is enabled in the BCJSSE and an SSL socket is created without an explicit hostname (as happens with HttpsURLConnection), hostname verification could be performed against a DNS-resolved IP address in some situations, opening up a possibility of DNS poisoning.

Пакеты

Наименование

org.bouncycastle:bcprov-jdk18on

maven
Затронутые версииВерсия исправления

>= 1.61, < 1.78

1.78

Наименование

org.bouncycastle:bcprov-jdk15to18

maven
Затронутые версииВерсия исправления

>= 1.61, < 1.78

1.78

Наименование

org.bouncycastle:bcprov-jdk14

maven
Затронутые версииВерсия исправления

>= 1.61, < 1.78

1.78

Наименование

org.bouncycastle:bcprov-jdk12

maven
Затронутые версииВерсия исправления

>= 1.61, < 1.78

1.78

Наименование

org.bouncycastle:bctls-fips

maven
Затронутые версииВерсия исправления

< 1.0.19

1.0.19

Наименование

org.bouncycastle:bcprov-lts8on

maven
Затронутые версииВерсия исправления

< 2.73.6

2.73.6

EPSS

Процентиль: 45%
0.00227
Низкий

5.9 Medium

CVSS3

Дефекты

CWE-297

Связанные уязвимости

CVSS3: 7.5
ubuntu
почти 2 года назад

An issue was discovered in the Bouncy Castle Crypto Package For Java before BC TLS Java 1.0.19 (ships with BC Java 1.78, BC Java (LTS) 2.73.6) and before BC FIPS TLS Java 1.0.19. When endpoint identification is enabled in the BCJSSE and an SSL socket is created without an explicit hostname (as happens with HttpsURLConnection), hostname verification could be performed against a DNS-resolved IP address in some situations, opening up a possibility of DNS poisoning.

CVSS3: 5.3
redhat
почти 2 года назад

An issue was discovered in the Bouncy Castle Crypto Package For Java before BC TLS Java 1.0.19 (ships with BC Java 1.78, BC Java (LTS) 2.73.6) and before BC FIPS TLS Java 1.0.19. When endpoint identification is enabled in the BCJSSE and an SSL socket is created without an explicit hostname (as happens with HttpsURLConnection), hostname verification could be performed against a DNS-resolved IP address in some situations, opening up a possibility of DNS poisoning.

CVSS3: 7.5
nvd
почти 2 года назад

An issue was discovered in the Bouncy Castle Crypto Package For Java before BC TLS Java 1.0.19 (ships with BC Java 1.78, BC Java (LTS) 2.73.6) and before BC FIPS TLS Java 1.0.19. When endpoint identification is enabled in the BCJSSE and an SSL socket is created without an explicit hostname (as happens with HttpsURLConnection), hostname verification could be performed against a DNS-resolved IP address in some situations, opening up a possibility of DNS poisoning.

CVSS3: 7.5
debian
почти 2 года назад

An issue was discovered in the Bouncy Castle Crypto Package For Java b ...

EPSS

Процентиль: 45%
0.00227
Низкий

5.9 Medium

CVSS3

Дефекты

CWE-297