CVE-2016-1000343 – org.bouncycastle:bcprov-jdk14
Package
Manager: maven
Name: org.bouncycastle:bcprov-jdk14
Vulnerable Version: >=0 <1.56
Severity
Level: High
CVSS v3.1: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N
EPSS: 0.01061 pctl0.76815
Details
In Bouncy Castle JCE Provider the DSA key pair generator generates a weak private key if used with default values In the Bouncy Castle JCE Provider version 1.55 and earlier the DSA key pair generator generates a weak private key if used with default values. If the JCA key pair generator is not explicitly initialised with DSA parameters, 1.55 and earlier generates a private value assuming a 1024 bit key size. In earlier releases this can be dealt with by explicitly passing parameters to the key pair generator.
Metadata
Created: 2018-10-17T16:24:22Z
Modified: 2022-04-27T13:29:11Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2018/10/GHSA-rrvx-pwf8-p59p/GHSA-rrvx-pwf8-p59p.json
CWE IDs: []
Alternative ID: GHSA-rrvx-pwf8-p59p
Finding: F052
Auto approve: 1