Ecosyste.ms: Advisories
An open API service providing security vulnerability metadata for many open source software ecosystems.
Security Advisories: GSA_kwCzR0hTQS04MzUzLWZnY3IteGZoeM4AAVMV
Improper Input Validation in Bouncy Castle
The TLS implementation in the Bouncy Castle Java library before 1.48 and C# library before 1.8 does not properly consider timing side-channel attacks on a noncompliant MAC check operation during the processing of malformed CBC padding, which allows remote attackers to conduct distinguishing attacks and plaintext-recovery attacks via statistical analysis of timing data for crafted packets, a related issue to CVE-2013-0169.
Permalink: https://github.com/advisories/GHSA-8353-fgcr-xfhxJSON: https://advisories.ecosyste.ms/api/v1/advisories/GSA_kwCzR0hTQS04MzUzLWZnY3IteGZoeM4AAVMV
Source: GitHub Advisory Database
Origin: Unspecified
Severity: Moderate
Classification: General
Published: almost 2 years ago
Updated: over 1 year ago
Identifiers: GHSA-8353-fgcr-xfhx, CVE-2013-1624
References:
- https://nvd.nist.gov/vuln/detail/CVE-2013-1624
- http://openwall.com/lists/oss-security/2013/02/05/24
- http://rhn.redhat.com/errata/RHSA-2014-0371.html
- http://rhn.redhat.com/errata/RHSA-2014-0372.html
- http://secunia.com/advisories/57716
- http://secunia.com/advisories/57719
- http://www.isg.rhul.ac.uk/tls/TLStiming.pdf
- https://github.com/advisories/GHSA-8353-fgcr-xfhx
Affected Packages
maven:org.bouncycastle:bcprov-jdk15on
Dependent packages: 3,304Dependent repositories: 18,945
Downloads:
Affected Version Ranges: < 1.48
Fixed in: 1.48
All affected versions:
All unaffected versions: 1.65.1