First published: Wed Dec 13 2017(Updated: )
Bouncy Castle could allow a remote attacker to obtain sensitive information, caused by an RSA Adaptive Chosen Ciphertext (Bleichenbacher) attack. By utilizing discrepancies in TLS error messages, an attacker could exploit this vulnerability to obtain the data in the encrypted messages once the TLS session has completed. Note: This vulnerability is also known as the ROBOT attack.
Credit: cret@cert.org
Affected Software | Affected Version | How to fix |
---|---|---|
IBM GDE | <=3.0.0.2 | |
debian/bouncycastle | 1.60-1 1.60-1+deb10u1 1.68-2 1.72-2 | |
Bouncycastle Legion-of-the-bouncy-castle-java-crytography-api | <1.59 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-13098 is a vulnerability in Bouncy Castle TLS prior to version 1.0.3 when configured to use the JCE (Java Cryptography Extension).
CVE-2017-13098 allows a remote attacker to obtain sensitive information by exploiting discrepancies in TLS error messages, leading to an RSA Adaptive Chosen Ciphertext (Bleichenbacher) attack.
CVE-2017-13098 has a severity rating of high, with a CVSS score of 5.9.
IBM GDE version 3.0.0.2 and Bouncy Castle versions 1.60-1, 1.60-1+deb10u1, 1.68-2, and 1.72-2 are affected by CVE-2017-13098.
To fix CVE-2017-13098, update Bouncy Castle to version 1.0.3 or later.