Описание
The Bouncy Castle Java library before 1.51 does not validate a point is withing the elliptic curve, which makes it easier for remote attackers to obtain private keys via a series of crafted elliptic curve Diffie Hellman (ECDH) key exchanges, aka an "invalid curve attack."
| Релиз | Статус | Примечание |
|---|---|---|
| artful | not-affected | 1.57-1 |
| bionic | not-affected | 1.59-1 |
| devel | not-affected | 1.60-1 |
| esm-apps/bionic | not-affected | 1.59-1 |
| esm-apps/xenial | not-affected | 1.51-4ubuntu1 |
| esm-infra-legacy/trusty | DNE | trusty/esm was DNE [trusty was released [1.49+dfsg-2ubuntu0.1]] |
| precise | ignored | end of life |
| precise/esm | DNE | precise was needed |
| trusty | released | 1.49+dfsg-2ubuntu0.1 |
| trusty/esm | DNE | trusty was released [1.49+dfsg-2ubuntu0.1] |
Показывать по
5 Medium
CVSS2
Связанные уязвимости
The Bouncy Castle Java library before 1.51 does not validate a point is withing the elliptic curve, which makes it easier for remote attackers to obtain private keys via a series of crafted elliptic curve Diffie Hellman (ECDH) key exchanges, aka an "invalid curve attack."
The Bouncy Castle Java library before 1.51 does not validate a point is withing the elliptic curve, which makes it easier for remote attackers to obtain private keys via a series of crafted elliptic curve Diffie Hellman (ECDH) key exchanges, aka an "invalid curve attack."
The Bouncy Castle Java library before 1.51 does not validate a point i ...
Moderate severity vulnerability that affects org.bouncycastle:bcprov-jdk14 and org.bouncycastle:bcprov-jdk15
5 Medium
CVSS2