Vulnerability Monitor

The vendors, products, and vulnerabilities you care about

CVE-2016-1000338


In Bouncy Castle JCE Provider version 1.55 and earlier the DSA does not fully validate ASN.1 encoding of signature on verification. It is possible to inject extra elements in the sequence making up the signature and still have it validate, which in some cases may allow the introduction of 'invisible' data into a signed structure.


Published

2018-06-01T20:29:00.217

Last Modified

2025-05-05T14:14:28.567

Status

Analyzed

Source

[email protected]

Severity

CVSSv3.1: 7.5 (HIGH)

CVSSv2 Vector

AV:N/AC:L/Au:N/C:N/I:P/A:N

  • Access Vector: NETWORK
  • Access Complexity: LOW
  • Authentication: NONE
  • Confidentiality Impact: NONE
  • Integrity Impact: PARTIAL
  • Availability Impact: NONE
Exploitability Score

10.0

Impact Score

2.9

Weaknesses
  • Type: Primary
    CWE-347

Affected Vendors & Products
Type Vendor Product Version/Range Vulnerable?
Application bouncycastle legion-of-the-bouncy-castle-java-crytography-api < 1.56 Yes
Application redhat satellite 6.4 Yes
Application redhat satellite_capsule 6.4 Yes
Operating System canonical ubuntu_linux 14.04 Yes
Application netapp 7-mode_transition_tool - Yes

References