CVE-2016-1000342
Summary
| CVE | CVE-2016-1000342 |
| State | PUBLIC |
| Assigner | [email protected] |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2018-06-04 13:29:00 UTC |
| Updated | 2020-10-20 22:15:00 UTC |
| Description | In the Bouncy Castle JCE Provider version 1.55 and earlier ECDSA does not fully validate ASN.1 encoding of signature on verification. It is possible to inject extra elements in the sequence making up the signature and still have it validate, which in some cases may allow the introduction of 'invisible' data into a signed structure. |
NVD Known Affected Configurations (CPE 2.3)
References
| Reference | Source | Link | Tags |
|---|
| Red Hat Customer Portal |
REDHAT |
access.redhat.com |
|
| Oracle Critical Patch Update Advisory - October 2020 |
MISC |
www.oracle.com |
|
| June 2018 Bouncy Castle Vulnerabilities in NetApp Products | NetApp Product Security |
CONFIRM |
security.netapp.com |
|
| [SECURITY] [DLA 1418-1] bouncycastle security update |
MLIST |
lists.debian.org |
Third Party Advisory |
| Added header validation for INTEGER/ENUMERATED · bcgit/bc-java@843c2e6 · GitHub |
CONFIRM |
github.com |
Patch, Third Party Advisory |
| Red Hat Customer Portal |
REDHAT |
access.redhat.com |
|
| USN-3727-1: Bouncy Castle vulnerabilities | Ubuntu security notices | Ubuntu |
UBUNTU |
usn.ubuntu.com |
|
| CVE Program record |
CVE.ORG |
www.cve.org |
canonical |
| NVD vulnerability detail |
NVD |
nvd.nist.gov |
canonical, analysis |
No vendor comments have been submitted for this CVE.
Legacy QID Mappings
- 980938 Java (maven) Security Update for org.bouncycastle:bcprov-jdk15 (GHSA-qcj7-g2j5-g7r3)