CVE-2013-1624 – org.bouncycastle:bcprov-jdk15on
Package
Manager: maven
Name: org.bouncycastle:bcprov-jdk15on
Vulnerable Version: >=0 <1.48
Severity
Level: Medium
CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N/E:U/RL:O/RC:C
CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N
EPSS: 0.00534 pctl0.66412
Details
Improper Input Validation in Bouncy Castle The TLS implementation in the Bouncy Castle Java library before 1.48 and C# library before 1.8 does not properly consider timing side-channel attacks on a noncompliant MAC check operation during the processing of malformed CBC padding, which allows remote attackers to conduct distinguishing attacks and plaintext-recovery attacks via statistical analysis of timing data for crafted packets, a related issue to CVE-2013-0169.
Metadata
Created: 2022-05-14T02:14:04Z
Modified: 2022-07-08T18:59:52Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2022/05/GHSA-8353-fgcr-xfhx/GHSA-8353-fgcr-xfhx.json
CWE IDs: ["CWE-20"]
Alternative ID: GHSA-8353-fgcr-xfhx
Finding: F184
Auto approve: 1