The Bouncy Castle Java library before 1.51 does not validate a point is withing the elliptic curve, which makes it easier for remote attackers to obtain private keys via a series of crafted elliptic curve Diffie Hellman (ECDH) key exchanges, aka an "invalid curve attack."
2015-11-09T16:59:09.277
2025-04-12T10:46:40.837
Deferred
CVSSv2: 5.0 (MEDIUM)
AV:N/AC:L/Au:N/C:P/I:N/A:N
10.0
2.9
Type | Vendor | Product | Version/Range | Vulnerable? |
---|---|---|---|---|
Operating System | opensuse | leap | 42.1 | Yes |
Operating System | opensuse | opensuse | 13.1 | Yes |
Operating System | opensuse | opensuse | 13.2 | Yes |
Application | bouncycastle | bouncy_castle_crypto_package | ≤ 1.50 | Yes |
Application | oracle | application_testing_suite | 12.5.0.1 | Yes |
Application | oracle | application_testing_suite | 12.5.0.2 | Yes |
Application | oracle | application_testing_suite | 12.5.0.3 | Yes |
Application | oracle | enterprise_manager_ops_center | 12.1.4 | Yes |
Application | oracle | enterprise_manager_ops_center | 12.2.2 | Yes |
Application | oracle | peoplesoft_enterprise_peopletools | 8.54 | Yes |
Application | oracle | peoplesoft_enterprise_peopletools | 8.55 | Yes |
Application | oracle | virtual_desktop_infrastructure | 3.5.2 | Yes |