ghsa-8477-3v39-ggpm
Vulnerability from github
Published
2022-05-13 01:01
Modified
2022-06-28 23:51
Severity ?
Summary
Improper Validation of Integrity Check Value in Bouncy Castle
Details
The default BKS keystore use an HMAC that is only 16 bits long, which can allow an attacker to compromise the integrity of a BKS keystore. Bouncy Castle release 1.47 changes the BKS format to a format which uses a 160 bit HMAC instead. This applies to any BKS keystore generated prior to BC 1.47. For situations where people need to create the files for legacy reasons a specific keystore type "BKS-V1" was introduced in 1.49. It should be noted that the use of "BKS-V1" is discouraged by the library authors and should only be used where it is otherwise safe to do so, as in where the use of a 16 bit checksum for the file integrity check is not going to cause a security issue in itself.
{ "affected": [ { "package": { "ecosystem": "Maven", "name": "org.bouncycastle:bcprov-jdk15on" }, "ranges": [ { "events": [ { "introduced": "0" }, { "fixed": "1.50" } ], "type": "ECOSYSTEM" } ] } ], "aliases": [ "CVE-2018-5382" ], "database_specific": { "cwe_ids": [ "CWE-354" ], "github_reviewed": true, "github_reviewed_at": "2022-06-28T23:51:50Z", "nvd_published_at": "2018-04-16T14:29:00Z", "severity": "MODERATE" }, "details": "The default BKS keystore use an HMAC that is only 16 bits long, which can allow an attacker to compromise the integrity of a BKS keystore. Bouncy Castle release 1.47 changes the BKS format to a format which uses a 160 bit HMAC instead. This applies to any BKS keystore generated prior to BC 1.47. For situations where people need to create the files for legacy reasons a specific keystore type \"BKS-V1\" was introduced in 1.49. It should be noted that the use of \"BKS-V1\" is discouraged by the library authors and should only be used where it is otherwise safe to do so, as in where the use of a 16 bit checksum for the file integrity check is not going to cause a security issue in itself.", "id": "GHSA-8477-3v39-ggpm", "modified": "2022-06-28T23:51:50Z", "published": "2022-05-13T01:01:01Z", "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-5382" }, { "type": "WEB", "url": "https://access.redhat.com/errata/RHSA-2018:2927" }, { "type": "WEB", "url": "https://www.bouncycastle.org/releasenotes.html" }, { "type": "WEB", "url": "https://www.kb.cert.org/vuls/id/306792" }, { "type": "WEB", "url": "https://www.oracle.com/security-alerts/cpuoct2020.html" }, { "type": "WEB", "url": "http://www.securityfocus.com/bid/103453" } ], "schema_version": "1.4.0", "severity": [ { "score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N", "type": "CVSS_V3" } ], "summary": "Improper Validation of Integrity Check Value in Bouncy Castle" }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.