First published: Fri Dec 18 2020(Updated: )
A flaw was found in bouncycastle. The OpenBSDBCrypt.checkPassword utility method compared incorrect data when checking the password allowing incorrect passwords to indicate they were matching with previously hashed ones that were different. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Bouncycastle Legion-of-the-bouncy-castle-java-crytography-api | =1.65 | |
Bouncycastle Legion-of-the-bouncy-castle-java-crytography-api | =1.66 | |
Apache Karaf | =4.3.2 | |
Oracle Banking Corporate Lending Process Management | =14.2.0 | |
Oracle Banking Corporate Lending Process Management | =14.3.0 | |
Oracle Banking Corporate Lending Process Management | =14.5.0 | |
Oracle Banking Credit Facilities Process Management | =14.2.0 | |
Oracle Banking Credit Facilities Process Management | =14.3.0 | |
Oracle Banking Credit Facilities Process Management | =14.5.0 | |
Oracle Banking Extensibility Workbench | =14.2.0 | |
Oracle Banking Extensibility Workbench | =14.3.0 | |
Oracle Banking Extensibility Workbench | =14.5.0 | |
Oracle Banking Supply Chain Finance | =14.2.0 | |
Oracle Banking Supply Chain Finance | =14.3.0 | |
Oracle Banking Supply Chain Finance | =14.5.0 | |
Oracle Banking Virtual Account Management | =14.2.0 | |
Oracle Banking Virtual Account Management | =14.3.0 | |
Oracle Banking Virtual Account Management | =14.5.0 | |
Oracle Blockchain Platform | <21.1.2 | |
Oracle Commerce Guided Search | =11.3.2 | |
Oracle Communications Application Session Controller | =3.9m0p3 | |
Oracle Communications Cloud Native Core Network Slice Selection Function | =1.2.1 | |
Oracle Communications Convergence | =3.0.2.2.0 | |
Oracle Communications Pricing Design Center | =12.0.0.3.0 | |
Oracle Communications Session Report Manager | >=8.0.0<=8.2.4.0 | |
Oracle Communications Session Route Manager | >=8.2.0<=8.2.4 | |
Oracle Jd Edwards Enterpriseone Tools | <=9.2.5.3 | |
Oracle PeopleSoft Enterprise PeopleTools | =8.56 | |
Oracle PeopleSoft Enterprise PeopleTools | =8.57 | |
Oracle PeopleSoft Enterprise PeopleTools | =8.58 | |
Oracle Utilities Framework | =4.3.0.6.0 | |
Oracle Utilities Framework | =4.4.0.0.0 | |
Oracle Utilities Framework | =4.4.0.2.0 | |
Oracle Utilities Framework | =4.4.0.3.0 | |
Oracle WebCenter Portal | =11.1.1.9.0 | |
Oracle WebCenter Portal | =12.2.1.3.0 | |
Oracle WebCenter Portal | =12.2.1.4.0 | |
Oracle Communications Messaging Server | =8.0.2 | |
Oracle Communications Messaging Server | =8.1 | |
redhat/eap7-activemq-artemis | <0:2.9.0-9.redhat_00019.1.el6ea | 0:2.9.0-9.redhat_00019.1.el6ea |
redhat/eap7-bouncycastle | <0:1.68.0-1.redhat_00001.1.el6ea | 0:1.68.0-1.redhat_00001.1.el6ea |
redhat/eap7-guava-failureaccess | <0:1.0.1-1.redhat_00002.1.el6ea | 0:1.0.1-1.redhat_00002.1.el6ea |
redhat/eap7-guava-libraries | <0:30.1.0-1.redhat_00001.1.el6ea | 0:30.1.0-1.redhat_00001.1.el6ea |
redhat/eap7-hal-console | <0:3.2.13-1.Final_redhat_00001.1.el6ea | 0:3.2.13-1.Final_redhat_00001.1.el6ea |
redhat/eap7-ironjacamar | <0:1.4.27-1.Final_redhat_00001.1.el6ea | 0:1.4.27-1.Final_redhat_00001.1.el6ea |
redhat/eap7-jboss-ejb-client | <0:4.0.39-1.SP1_redhat_00001.1.el6ea | 0:4.0.39-1.SP1_redhat_00001.1.el6ea |
redhat/eap7-jboss-logmanager | <0:2.1.18-1.Final_redhat_00001.1.el6ea | 0:2.1.18-1.Final_redhat_00001.1.el6ea |
redhat/eap7-jboss-remoting | <0:5.0.20-2.SP1_redhat_00001.1.el6ea | 0:5.0.20-2.SP1_redhat_00001.1.el6ea |
redhat/eap7-jboss-server-migration | <0:1.7.2-5.Final_redhat_00006.1.el6ea | 0:1.7.2-5.Final_redhat_00006.1.el6ea |
redhat/eap7-narayana | <0:5.9.11-1.Final_redhat_00001.1.el6ea | 0:5.9.11-1.Final_redhat_00001.1.el6ea |
redhat/eap7-undertow | <0:2.0.34-1.SP1_redhat_00001.1.el6ea | 0:2.0.34-1.SP1_redhat_00001.1.el6ea |
redhat/eap7-wildfly | <0:7.3.6-1.GA_redhat_00002.1.el6ea | 0:7.3.6-1.GA_redhat_00002.1.el6ea |
redhat/eap7-wildfly-elytron | <0:1.10.11-1.Final_redhat_00001.1.el6ea | 0:1.10.11-1.Final_redhat_00001.1.el6ea |
redhat/eap7-wildfly-http-client | <0:1.0.25-1.Final_redhat_00001.1.el6ea | 0:1.0.25-1.Final_redhat_00001.1.el6ea |
redhat/eap7-wildfly-naming-client | <0:1.0.14-1.Final_redhat_00001.1.el6ea | 0:1.0.14-1.Final_redhat_00001.1.el6ea |
redhat/eap7-activemq-artemis | <0:2.9.0-9.redhat_00019.1.el7ea | 0:2.9.0-9.redhat_00019.1.el7ea |
redhat/eap7-bouncycastle | <0:1.68.0-1.redhat_00001.1.el7ea | 0:1.68.0-1.redhat_00001.1.el7ea |
redhat/eap7-guava-failureaccess | <0:1.0.1-1.redhat_00002.1.el7ea | 0:1.0.1-1.redhat_00002.1.el7ea |
redhat/eap7-guava-libraries | <0:30.1.0-1.redhat_00001.1.el7ea | 0:30.1.0-1.redhat_00001.1.el7ea |
redhat/eap7-hal-console | <0:3.2.13-1.Final_redhat_00001.1.el7ea | 0:3.2.13-1.Final_redhat_00001.1.el7ea |
redhat/eap7-ironjacamar | <0:1.4.27-1.Final_redhat_00001.1.el7ea | 0:1.4.27-1.Final_redhat_00001.1.el7ea |
redhat/eap7-jboss-ejb-client | <0:4.0.39-1.SP1_redhat_00001.1.el7ea | 0:4.0.39-1.SP1_redhat_00001.1.el7ea |
redhat/eap7-jboss-logmanager | <0:2.1.18-1.Final_redhat_00001.1.el7ea | 0:2.1.18-1.Final_redhat_00001.1.el7ea |
redhat/eap7-jboss-remoting | <0:5.0.20-2.SP1_redhat_00001.1.el7ea | 0:5.0.20-2.SP1_redhat_00001.1.el7ea |
redhat/eap7-jboss-server-migration | <0:1.7.2-5.Final_redhat_00006.1.el7ea | 0:1.7.2-5.Final_redhat_00006.1.el7ea |
redhat/eap7-narayana | <0:5.9.11-1.Final_redhat_00001.1.el7ea | 0:5.9.11-1.Final_redhat_00001.1.el7ea |
redhat/eap7-undertow | <0:2.0.34-1.SP1_redhat_00001.1.el7ea | 0:2.0.34-1.SP1_redhat_00001.1.el7ea |
redhat/eap7-wildfly | <0:7.3.6-1.GA_redhat_00002.1.el7ea | 0:7.3.6-1.GA_redhat_00002.1.el7ea |
redhat/eap7-wildfly-elytron | <0:1.10.11-1.Final_redhat_00001.1.el7ea | 0:1.10.11-1.Final_redhat_00001.1.el7ea |
redhat/eap7-wildfly-http-client | <0:1.0.25-1.Final_redhat_00001.1.el7ea | 0:1.0.25-1.Final_redhat_00001.1.el7ea |
redhat/eap7-wildfly-naming-client | <0:1.0.14-1.Final_redhat_00001.1.el7ea | 0:1.0.14-1.Final_redhat_00001.1.el7ea |
redhat/eap7-activemq-artemis | <0:2.9.0-9.redhat_00019.1.el8ea | 0:2.9.0-9.redhat_00019.1.el8ea |
redhat/eap7-bouncycastle | <0:1.68.0-1.redhat_00001.1.el8ea | 0:1.68.0-1.redhat_00001.1.el8ea |
redhat/eap7-guava-failureaccess | <0:1.0.1-1.redhat_00002.1.el8ea | 0:1.0.1-1.redhat_00002.1.el8ea |
redhat/eap7-guava-libraries | <0:30.1.0-1.redhat_00001.1.el8ea | 0:30.1.0-1.redhat_00001.1.el8ea |
redhat/eap7-hal-console | <0:3.2.13-1.Final_redhat_00001.1.el8ea | 0:3.2.13-1.Final_redhat_00001.1.el8ea |
redhat/eap7-ironjacamar | <0:1.4.27-1.Final_redhat_00001.1.el8ea | 0:1.4.27-1.Final_redhat_00001.1.el8ea |
redhat/eap7-jboss-ejb-client | <0:4.0.39-1.SP1_redhat_00001.1.el8ea | 0:4.0.39-1.SP1_redhat_00001.1.el8ea |
redhat/eap7-jboss-logmanager | <0:2.1.18-1.Final_redhat_00001.1.el8ea | 0:2.1.18-1.Final_redhat_00001.1.el8ea |
redhat/eap7-jboss-remoting | <0:5.0.20-2.SP1_redhat_00001.1.el8ea | 0:5.0.20-2.SP1_redhat_00001.1.el8ea |
redhat/eap7-jboss-server-migration | <0:1.7.2-5.Final_redhat_00006.1.el8ea | 0:1.7.2-5.Final_redhat_00006.1.el8ea |
redhat/eap7-narayana | <0:5.9.11-1.Final_redhat_00001.1.el8ea | 0:5.9.11-1.Final_redhat_00001.1.el8ea |
redhat/eap7-undertow | <0:2.0.34-1.SP1_redhat_00001.1.el8ea | 0:2.0.34-1.SP1_redhat_00001.1.el8ea |
redhat/eap7-wildfly | <0:7.3.6-1.GA_redhat_00002.1.el8ea | 0:7.3.6-1.GA_redhat_00002.1.el8ea |
redhat/eap7-wildfly-elytron | <0:1.10.11-1.Final_redhat_00001.1.el8ea | 0:1.10.11-1.Final_redhat_00001.1.el8ea |
redhat/eap7-wildfly-http-client | <0:1.0.25-1.Final_redhat_00001.1.el8ea | 0:1.0.25-1.Final_redhat_00001.1.el8ea |
redhat/eap7-wildfly-naming-client | <0:1.0.14-1.Final_redhat_00001.1.el8ea | 0:1.0.14-1.Final_redhat_00001.1.el8ea |
Users unable to upgrade to version 1.67 or greater can copy the `OpenBSDBCrypt.doCheckPassword()` method implementation (https://github.com/bcgit/bc-java/blob/r1rv67/core/src/main/java/org/bouncycastle/crypto/generators/OpenBSDBCrypt.java#L259-L343) into their own utility class and supplement it with the required methods and variables as required
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Appears in the following advisories)