First published: Mon Jun 04 2018(Updated: )
Bouncy Castle JCE Provider could provide weaker than expected security, caused by improper validation of ASN.1 encoding of signature in the ECDSA. A remote attacker could exploit this vulnerability to launch further attacks.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Bouncycastle Legion-of-the-bouncy-castle-java-crytography-api | <=1.55 | |
Debian Debian Linux | =8.0 | |
redhat/bouncycastle | <1.56 | 1.56 |
debian/bouncycastle | 1.68-2 1.72-2 1.77-1 | |
IBM GDE | <=3.0.0.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-1000342 is a vulnerability in the Bouncy Castle JCE Provider that could provide weaker than expected security caused by improper validation.
CVE-2016-1000342 has a severity level of 7.5 (high).
Bouncy Castle JCE Provider version 1.55 and earlier is affected by CVE-2016-1000342.
To fix CVE-2016-1000342, you should update your Bouncy Castle JCE Provider to version 1.56-1 or later.
You can find more information about CVE-2016-1000342 on the MITRE CVE website, the Ubuntu security notices, and the NVD.