Severity
7.5HIGH
EPSS
0.4%
top 41.10%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedJun 1
Latest updateOct 17
Description
In Bouncy Castle JCE Provider version 1.55 and earlier the DSA does not fully validate ASN.1 encoding of signature on verification. It is possible to inject extra elements in the sequence making up the signature and still have it validate, which in some cases may allow the introduction of 'invisible' data into a signed structure.
CVSS vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:NExploitability: 3.9 | Impact: 3.6
Affected Packages7 packages
Also affects: Ubuntu Linux 14.04
Patches
🔴Vulnerability Details
4GHSA▶
In Bouncy Castle JCE Provider it is possible to inject extra elements in the sequence making up the signature and still have it validate↗2018-10-17
OSV▶
In Bouncy Castle JCE Provider it is possible to inject extra elements in the sequence making up the signature and still have it validate↗2018-10-17
📋Vendor Advisories
3💬Community
4Bugzilla▶
CVE-2016-1000338 bouncycastle: DSA does not fully validate ASN.1 encoding during signature verification allowing for injection of unsigned data [epel-all]↗2018-06-07
Bugzilla▶
CVE-2016-1000338 bouncycastle: DSA does not fully validate ASN.1 encoding during signature verification allowing for injection of unsigned data [fedora-all]↗2018-06-07
Bugzilla▶
CVE-2016-1000338 bouncycastle: DSA does not fully validate ASN.1 encoding during signature verification allowing for injection of unsigned data [epel-6]↗2018-06-07
Bugzilla▶
CVE-2016-1000338 bouncycastle: DSA does not fully validate ASN.1 encoding during signature verification allowing for injection of unsigned data↗2018-06-07