Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2024-34447

Опубликовано: 03 мая 2024
Источник: redhat
CVSS3: 5.3
EPSS Низкий

Описание

An issue was discovered in the Bouncy Castle Crypto Package For Java before BC TLS Java 1.0.19 (ships with BC Java 1.78, BC Java (LTS) 2.73.6) and before BC FIPS TLS Java 1.0.19. When endpoint identification is enabled in the BCJSSE and an SSL socket is created without an explicit hostname (as happens with HttpsURLConnection), hostname verification could be performed against a DNS-resolved IP address in some situations, opening up a possibility of DNS poisoning.

A flaw was found in Bouncy Castle Java Cryptography APIs. Affected versions of this package are vulnerable to a use of incorrectly-resolved name or reference issue when resolving domain names over an SSL socket that was created without an explicit hostname, such as in the HttpsURLConnection() function. If endpoint identification is enabled, this flow allows an attacker to trigger hostname verification against a DNS-resolved address.

Отчет

The vulnerability in Bouncy Castle Java Cryptography APIs, allowing for incorrect resolution of domain names during SSL/TLS connections without explicitly specifying a hostname, is assessed as moderate severity due to its potential impact on security. By exploiting this flaw, an attacker could manipulate DNS resolution to present a different server's certificate, leading to a mismatch between expected and verified hostnames. While this could facilitate a man-in-the-middle attack under specific conditions, its severity is moderated by the prerequisite of the attacker controlling DNS responses or intercepting network traffic.

Меры по смягчению последствий

Mitigation for this issue is either not available or the currently available options don't meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
A-MQ Clients 2org.bouncycastle-bctlsWill not fix
Logging Subsystem for Red Hat OpenShiftopenshift-logging/elasticsearch6-rhel8Not affected
Migration Toolkit for Applications 6org.bouncycastle-bctlsWill not fix
Migration Toolkit for Runtimesorg.bouncycastle-bctlsWill not fix
Red Hat build of Apache Camel for Spring Boot 3org.bouncycastle-bctlsOut of support scope
Red Hat Build of Keycloakorg.bouncycastle-bctlsAffected
Red Hat Data Grid 8org.bouncycastle-bctlsNot affected
Red Hat Fuse 7org.bouncycastle-bctlsNot affected
Red Hat Integration Camel K 1org.bouncycastle-bctlsWill not fix
Red Hat JBoss Enterprise Application Platform 7org.bouncycastle-bctlsNot affected

Показывать по

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-706
https://bugzilla.redhat.com/show_bug.cgi?id=2279227org.bouncycastle: Use of Incorrectly-Resolved Name or Reference

EPSS

Процентиль: 45%
0.00227
Низкий

5.3 Medium

CVSS3

Связанные уязвимости

CVSS3: 7.5
ubuntu
почти 2 года назад

An issue was discovered in the Bouncy Castle Crypto Package For Java before BC TLS Java 1.0.19 (ships with BC Java 1.78, BC Java (LTS) 2.73.6) and before BC FIPS TLS Java 1.0.19. When endpoint identification is enabled in the BCJSSE and an SSL socket is created without an explicit hostname (as happens with HttpsURLConnection), hostname verification could be performed against a DNS-resolved IP address in some situations, opening up a possibility of DNS poisoning.

CVSS3: 7.5
nvd
почти 2 года назад

An issue was discovered in the Bouncy Castle Crypto Package For Java before BC TLS Java 1.0.19 (ships with BC Java 1.78, BC Java (LTS) 2.73.6) and before BC FIPS TLS Java 1.0.19. When endpoint identification is enabled in the BCJSSE and an SSL socket is created without an explicit hostname (as happens with HttpsURLConnection), hostname verification could be performed against a DNS-resolved IP address in some situations, opening up a possibility of DNS poisoning.

CVSS3: 7.5
debian
почти 2 года назад

An issue was discovered in the Bouncy Castle Crypto Package For Java b ...

CVSS3: 5.9
github
почти 2 года назад

Bouncy Castle Java Cryptography API vulnerable to DNS poisoning

EPSS

Процентиль: 45%
0.00227
Низкий

5.3 Medium

CVSS3