First published: Tue Mar 20 2012(Updated: )
Bouncy Castle could allow a local attacker to obtain sensitive information, caused by an error in the BKS version 1 keystore files. By utilizing an HMAC that is only 16 bits long for the MAC key size, an attacker could exploit this vulnerability using brute-force techniques to crack a BKS-V1 keystore file in seconds and gain access to the keystore contents.
Credit: cret@cert.org
Affected Software | Affected Version | How to fix |
---|---|---|
IBM GDE | <=3.0.0.2 | |
Bouncycastle Legion-of-the-bouncy-castle-java-crytography-api | <=1.49 | |
Redhat Satellite | =6.4 | |
Redhat Satellite Capsule | =6.4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-5382 is a vulnerability in Bouncy Castle that could allow a local attacker to obtain sensitive information.
The severity of CVE-2018-5382 is medium with a CVSS score of 4.4.
An attacker can exploit CVE-2018-5382 by compromising the integrity of a BKS keystore that uses a 16-bit HMAC.
To fix CVE-2018-5382, update Bouncy Castle to version 1.47 or later.
More information about CVE-2018-5382 can be found at the following links: [link1](https://insights.sei.cmu.edu/cert/2018/03/the-curious-case-of-the-bouncy-castle-bks-passwords.html), [link2](https://www.kb.cert.org/vuls/id/306792), [link3](https://access.redhat.com/security/updates/classification/).