CVE-2016-1000346

CWE-320CWE-32510 documents8 sources
Severity
3.7LOW
EPSS
1.0%
top 23.49%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedJun 4
Latest updateOct 17

Description

In the Bouncy Castle JCE Provider version 1.55 and earlier the other party DH public key is not fully validated. This can cause issues as invalid keys can be used to reveal details about the other party's private key where static Diffie-Hellman is in use. As of release 1.56 the key parameters are checked on agreement calculation.

CVSS vector

CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:NExploitability: 2.2 | Impact: 1.4

Affected Packages5 packages

Also affects: Debian Linux 8.0

Patches

🔴Vulnerability Details

4
GHSA
In Bouncy Castle JCE Provider the other party DH public key is not fully validated2018-10-17
OSV
In Bouncy Castle JCE Provider the other party DH public key is not fully validated2018-10-17
CVEList
CVE-2016-1000346: In the Bouncy Castle JCE Provider version 12018-06-04
OSV
CVE-2016-1000346: In the Bouncy Castle JCE Provider version 12018-06-04

📋Vendor Advisories

3
Ubuntu
Bouncy Castle vulnerabilities2018-08-01
Red Hat
bouncycastle: Other party DH public keys are not fully validated2016-10-29
Debian
CVE-2016-1000346: bouncycastle - In the Bouncy Castle JCE Provider version 1.55 and earlier the other party DH pu...2016

💬Community

2
Bugzilla
CVE-2016-1000346 bouncycastle: Other party DH public keys are not fully validated2018-06-07
Bugzilla
CVE-2016-1000346 bouncycastle: Other party DH public keys are not fully validated [epel-6]2018-06-07
CVE-2016-1000346 (LOW CVSS 3.7) | In the Bouncy Castle JCE Provider v | cvebase.io