Vulnerabilidad en la libreria Bouncy Castle Java (CVE-2015-7940)
Gravedad CVSS v2.0:
MEDIA
Tipo:
CWE-200
Revelación de información
Fecha de publicación:
09/11/2015
Última modificación:
12/04/2025
Descripción
La librería Bouncy Castle Java en versiones anteriores a 1.51 no valida un punto que se encuentra dentro de la curva elíptica, lo que facilita a atacantes remotos obtener claves privadas a través de una serie de intercambios de clave de curva elíptica Diffie Hellman (ECDH) manipulados, también conocida como un 'ataque de curva no válida'.
Impacto
Puntuación base 2.0
5.00
Gravedad 2.0
MEDIA
Productos y versiones vulnerables
| CPE | Desde | Hasta |
|---|---|---|
| cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:* | ||
| cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:* | ||
| cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:* | ||
| cpe:2.3:a:bouncycastle:bouncy_castle_crypto_package:*:*:*:*:*:*:*:* | 1.50 (incluyendo) | |
| cpe:2.3:a:oracle:application_testing_suite:12.5.0.1:*:*:*:*:*:*:* | ||
| cpe:2.3:a:oracle:application_testing_suite:12.5.0.2:*:*:*:*:*:*:* | ||
| cpe:2.3:a:oracle:application_testing_suite:12.5.0.3:*:*:*:*:*:*:* | ||
| cpe:2.3:a:oracle:enterprise_manager_ops_center:12.1.4:*:*:*:*:*:*:* | ||
| cpe:2.3:a:oracle:enterprise_manager_ops_center:12.2.2:*:*:*:*:*:*:* | ||
| cpe:2.3:a:oracle:peoplesoft_enterprise_peopletools:8.54:*:*:*:*:*:*:* | ||
| cpe:2.3:a:oracle:peoplesoft_enterprise_peopletools:8.55:*:*:*:*:*:*:* | ||
| cpe:2.3:a:oracle:virtual_desktop_infrastructure:3.5.2:*:*:*:*:*:*:* |
Para consultar la lista completa de nombres de CPE con productos y versiones, ver esta página
Referencias a soluciones, herramientas e información
- http://lists.fedoraproject.org/pipermail/package-announce/2016-January/174915.html
- http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00012.html
- http://rhn.redhat.com/errata/RHSA-2016-2035.html
- http://rhn.redhat.com/errata/RHSA-2016-2036.html
- http://web-in-security.blogspot.ca/2015/09/practical-invalid-curve-attacks.html
- http://www.debian.org/security/2015/dsa-3417
- http://www.openwall.com/lists/oss-security/2015/10/22/7
- http://www.openwall.com/lists/oss-security/2015/10/22/9
- http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html
- http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html
- http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html
- http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html
- http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html
- http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
- http://www.securityfocus.com/bid/79091
- http://www.securitytracker.com/id/1037036
- http://www.securitytracker.com/id/1037046
- http://www.securitytracker.com/id/1037053
- https://usn.ubuntu.com/3727-1/
- https://www.oracle.com/security-alerts/cpuapr2020.html
- https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html
- http://lists.fedoraproject.org/pipermail/package-announce/2016-January/174915.html
- http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00012.html
- http://rhn.redhat.com/errata/RHSA-2016-2035.html
- http://rhn.redhat.com/errata/RHSA-2016-2036.html
- http://web-in-security.blogspot.ca/2015/09/practical-invalid-curve-attacks.html
- http://www.debian.org/security/2015/dsa-3417
- http://www.openwall.com/lists/oss-security/2015/10/22/7
- http://www.openwall.com/lists/oss-security/2015/10/22/9
- http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html
- http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html
- http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html
- http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html
- http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html
- http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
- http://www.securityfocus.com/bid/79091
- http://www.securitytracker.com/id/1037036
- http://www.securitytracker.com/id/1037046
- http://www.securitytracker.com/id/1037053
- https://usn.ubuntu.com/3727-1/
- https://www.oracle.com/security-alerts/cpuapr2020.html
- https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html



