Описание
In the Bouncy Castle JCE Provider version 1.55 and earlier the DHIES/ECIES CBC mode vulnerable to padding oracle attack. For BC 1.55 and older, in an environment where timings can be easily observed, it is possible with enough observations to identify when the decryption is failing due to padding.
Отчет
This issue affects the versions of bouncycastle as shipped with Red Hat Subscription Asset Manager 1.x. Red Hat Product Security has rated this issue as having a security impact of Moderate. No update is planned for this product at this time. For additional information, refer to the Issue Severity Classification: https://access.redhat.com/security/updates/classification/.
Затронутые пакеты
| Платформа | Пакет | Состояние | Рекомендация | Релиз |
|---|---|---|---|---|
| JBoss Developer Studio 11 | bouncycastle | Not affected | ||
| Red Hat JBoss Data Grid 7 | bouncycastle | Not affected | ||
| Red Hat JBoss Data Virtualization 6 | bouncycastle | Out of support scope | ||
| Red Hat JBoss Enterprise Application Platform 7 | bouncycastle | Not affected | ||
| Red Hat JBoss Fuse 6 | bouncycastle | Will not fix | ||
| Red Hat JBoss Fuse Integration Service 2 | bouncycastle | Not affected | ||
| Red Hat OpenShift Application Runtimes | bouncycastle | Not affected | ||
| Red Hat Single Sign-On 7 | bouncycastle | Not affected | ||
| Red Hat Software Collections | rh-eclipse46-bouncycastle | Will not fix | ||
| Red Hat Subscription Asset Manager | bouncycastle | Will not fix |
Показывать по
Дополнительная информация
Статус:
EPSS
4.8 Medium
CVSS3
Связанные уязвимости
In the Bouncy Castle JCE Provider version 1.55 and earlier the DHIES/ECIES CBC mode vulnerable to padding oracle attack. For BC 1.55 and older, in an environment where timings can be easily observed, it is possible with enough observations to identify when the decryption is failing due to padding.
In the Bouncy Castle JCE Provider version 1.55 and earlier the DHIES/ECIES CBC mode vulnerable to padding oracle attack. For BC 1.55 and older, in an environment where timings can be easily observed, it is possible with enough observations to identify when the decryption is failing due to padding.
In the Bouncy Castle JCE Provider version 1.55 and earlier the DHIES/E ...
Moderate severity vulnerability that affects org.bouncycastle:bcprov-jdk14 and org.bouncycastle:bcprov-jdk15
EPSS
4.8 Medium
CVSS3