The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a database and tools to fix them.

Computer vulnerabilities of Apache WSS4J

vulnerability note CVE-2015-0226 CVE-2015-0227

Apache WSS4J: two vulnerabilities

Synthesis of the vulnerability

An attacker can use several vulnerabilities of Apache WSS4J.
Impacted products: WSS4J, WebSphere AS Traditional, RHEL, JBoss EAP by Red Hat.
Severity: 2/4.
Consequences: data reading, data creation/edition.
Provenance: document.
Number of vulnerabilities in this bulletin: 2.
Creation date: 10/02/2015.
Identifiers: 1959083, CVE-2015-0226, CVE-2015-0227, RHSA-2015:0773-01, RHSA-2015:0846-01, RHSA-2015:0847-01, RHSA-2015:0848-01, RHSA-2015:0849-01, RHSA-2015:1176-01, RHSA-2015:1177-01, VIGILANCE-VUL-16144.

Description of the vulnerability

Several vulnerabilities were announced in Apache WSS4J.

An attacker can analyze decryption errors of XML Encryption with PKCS#1 v1.5 Key Transport Algorithm, in order to perform a Bleichenbacher attack. [severity:2/4; CVE-2015-0226]

An attacker can bypass the requireSignedEncryptedDataElements directive, in order to ignore the signature. [severity:2/4; CVE-2015-0227]
Full Vigil@nce bulletin... (Free trial)
Our database contains other pages. You can request a free trial to read them.

Display information about Apache WSS4J: