Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2018-5382

Опубликовано: 30 мар. 2012
Источник: redhat
CVSS3: 5.1
EPSS Низкий

Описание

The default BKS keystore use an HMAC that is only 16 bits long, which can allow an attacker to compromise the integrity of a BKS keystore. Bouncy Castle release 1.47 changes the BKS format to a format which uses a 160 bit HMAC instead. This applies to any BKS keystore generated prior to BC 1.47. For situations where people need to create the files for legacy reasons a specific keystore type "BKS-V1" was introduced in 1.49. It should be noted that the use of "BKS-V1" is discouraged by the library authors and should only be used where it is otherwise safe to do so, as in where the use of a 16 bit checksum for the file integrity check is not going to cause a security issue in itself.

A flaw involving a risky cryptographic algorithm was found in Bouncycastle. BKS-V1 contained a design flaw resulting from using the SHA-1 hash function, as it contains a 16-bit MAC key size and a 160-bit SHA-1 hash function. This flaw allows an attacker to brute force the password due to the trivial hash collisions, resulting in a loss of confidentiality and integrity.

Отчет

Red Hat Product Security has rated this issue as having a security impact of Low. This issue is not currently planned to be addressed in future updates. For additional information, refer to the Issue Severity Classification: https://access.redhat.com/security/updates/classification/.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat JBoss Data Virtualization 6bouncycastleOut of support scope
Red Hat JBoss Enterprise Application Platform 7bouncycastleAffected
Red Hat Software Collectionsrh-eclipse46-bouncycastleNot affected
Red Hat Subscription Asset ManagerbouncycastleWill not fix
Red Hat Virtualization 4eap7-bouncycastleNot affected
streams for Apache KafkabouncycastleFix deferred
Red Hat Satellite 6.4 for RHEL 7ansiblerole-insights-clientFixedRHSA-2018:292716.10.2018
Red Hat Satellite 6.4 for RHEL 7candlepinFixedRHSA-2018:292716.10.2018
Red Hat Satellite 6.4 for RHEL 7createrepo_cFixedRHSA-2018:292716.10.2018
Red Hat Satellite 6.4 for RHEL 7foremanFixedRHSA-2018:292716.10.2018

Показывать по

Дополнительная информация

Статус:

Low
Дефект:
CWE-327
https://bugzilla.redhat.com/show_bug.cgi?id=1563749bouncycastle: BKS-V1 keystore files vulnerable to trivial hash collisions

EPSS

Процентиль: 36%
0.00153
Низкий

5.1 Medium

CVSS3

Связанные уязвимости

CVSS3: 4.4
ubuntu
почти 8 лет назад

The default BKS keystore use an HMAC that is only 16 bits long, which can allow an attacker to compromise the integrity of a BKS keystore. Bouncy Castle release 1.47 changes the BKS format to a format which uses a 160 bit HMAC instead. This applies to any BKS keystore generated prior to BC 1.47. For situations where people need to create the files for legacy reasons a specific keystore type "BKS-V1" was introduced in 1.49. It should be noted that the use of "BKS-V1" is discouraged by the library authors and should only be used where it is otherwise safe to do so, as in where the use of a 16 bit checksum for the file integrity check is not going to cause a security issue in itself.

CVSS3: 4.4
nvd
почти 8 лет назад

The default BKS keystore use an HMAC that is only 16 bits long, which can allow an attacker to compromise the integrity of a BKS keystore. Bouncy Castle release 1.47 changes the BKS format to a format which uses a 160 bit HMAC instead. This applies to any BKS keystore generated prior to BC 1.47. For situations where people need to create the files for legacy reasons a specific keystore type "BKS-V1" was introduced in 1.49. It should be noted that the use of "BKS-V1" is discouraged by the library authors and should only be used where it is otherwise safe to do so, as in where the use of a 16 bit checksum for the file integrity check is not going to cause a security issue in itself.

CVSS3: 4.4
debian
почти 8 лет назад

The default BKS keystore use an HMAC that is only 16 bits long, which ...

CVSS3: 4.4
github
больше 3 лет назад

Improper Validation of Integrity Check Value in Bouncy Castle

EPSS

Процентиль: 36%
0.00153
Низкий

5.1 Medium

CVSS3

Уязвимость CVE-2018-5382