Ecosyste.ms: Advisories

An open API service providing security vulnerability metadata for many open source software ecosystems.

Security Advisories: MDE2OlNlY3VyaXR5QWR2aXNvcnlHSFNBLXJydngtcHdmOC1wNTlw

In Bouncy Castle JCE Provider the DSA key pair generator generates a weak private key if used with default values

In the Bouncy Castle JCE Provider version 1.55 and earlier the DSA key pair generator generates a weak private key if used with default values. If the JCA key pair generator is not explicitly initialised with DSA parameters, 1.55 and earlier generates a private value assuming a 1024 bit key size. In earlier releases this can be dealt with by explicitly passing parameters to the key pair generator.

Permalink: https://github.com/advisories/GHSA-rrvx-pwf8-p59p
JSON: https://advisories.ecosyste.ms/api/v1/advisories/MDE2OlNlY3VyaXR5QWR2aXNvcnlHSFNBLXJydngtcHdmOC1wNTlw
Source: GitHub Advisory Database
Origin: Unspecified
Severity: High
Classification: General
Published: about 6 years ago
Updated: almost 2 years ago


CVSS Score: 7.5
CVSS vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

EPSS Percentage: 0.00383
EPSS Percentile: 0.7273

Identifiers: GHSA-rrvx-pwf8-p59p, CVE-2016-1000343
References: Repository: https://github.com/bcgit/bc-java
Blast Radius: 22.5

Affected Packages

maven:org.bouncycastle:bcprov-jdk15
Dependent packages: 104
Dependent repositories: 985
Downloads:
Affected Version Ranges: < 1.56
Fixed in: 1.56
All affected versions:
All unaffected versions:
maven:org.bouncycastle:bcprov-jdk14
Dependent packages: 33
Dependent repositories: 201
Downloads:
Affected Version Ranges: < 1.56
Fixed in: 1.56
All affected versions:
All unaffected versions: 1.78.1