The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a vigilance database and tools to fix them.

Vulnerability of Bouncy Castle, Oracle Java: disclosure of elliptic curve private keys

Synthesis of the vulnerability 

An attacker can use a vulnerability in the elliptic curve implementation of Bouncy Castle and Oracle Java, in order to obtain sensitive information.
Vulnerable products: Bouncy Castle JCE, DCFM Enterprise, FabricOS, Brocade Network Advisor, Brocade vTM, Debian, Fedora, IRAD, WebSphere MQ, Juniper SBR, Mule ESB, SnapManager, Java OpenJDK, openSUSE, openSUSE Leap, Oracle Communications, Oracle Directory Server, Oracle Directory Services Plus, Oracle Fusion Middleware, Oracle GlassFish Server, Oracle Identity Management, Oracle Internet Directory, Oracle iPlanet Web Server, Java Oracle, JavaFX, Oracle OIT, Tuxedo, Oracle Virtual Directory, WebLogic, Oracle Web Tier, Ubuntu.
Severity of this weakness: 3/4.
Number of vulnerabilities in this bulletin: 2.
Creation date: 22/10/2015.
Références of this bulletin: 1968485, 1972455, 9010041, 9010044, BSA-2016-002, CERTFR-2019-AVI-325, cpuapr2018, cpuapr2020, cpujan2017, cpujan2018, cpujan2019, cpujul2015, cpujul2017, cpujul2018, cpuoct2017, CVE-2015-2613, CVE-2015-7940, DSA-3417-1, FEDORA-2015-7d95466eda, JSA10939, NTAP-20150715-0001, NTAP-20151028-0001, openSUSE-SU-2015:1911-1, RHSA-2016:2035-01, RHSA-2016:2036-01, USN-3727-1, VIGILANCE-VUL-18168.

Description of the vulnerability 

The Bouncy Castle and Oracle Java products implement algorithms based on elliptic curves.

However, if the client forces the server to compute a common secret based on points located outside the chosen curve, he can progressively guess the full server key.

An attacker can therefore use a vulnerability in the elliptic curve implementation of Bouncy Castle and Oracle Java, in order to obtain sensitive information.
Full bulletin, software filtering, emails, fixes, ... (Request your free trial)

This cybersecurity weakness impacts software or systems such as Bouncy Castle JCE, DCFM Enterprise, FabricOS, Brocade Network Advisor, Brocade vTM, Debian, Fedora, IRAD, WebSphere MQ, Juniper SBR, Mule ESB, SnapManager, Java OpenJDK, openSUSE, openSUSE Leap, Oracle Communications, Oracle Directory Server, Oracle Directory Services Plus, Oracle Fusion Middleware, Oracle GlassFish Server, Oracle Identity Management, Oracle Internet Directory, Oracle iPlanet Web Server, Java Oracle, JavaFX, Oracle OIT, Tuxedo, Oracle Virtual Directory, WebLogic, Oracle Web Tier, Ubuntu.

Our Vigil@nce team determined that the severity of this security vulnerability is important.

The trust level is of type confirmed by the editor, with an origin of internet client.

This bulletin is about 2 vulnerabilities.

An attacker with a expert ability can exploit this vulnerability bulletin.

Solutions for this threat 

Oracle Java, OpenJDK: version 8u51.
The version 8u51 is fixed:
  http://www.oracle.com/technetwork/java/javase/downloads/index.html
  http://www.oracle.com/technetwork/java/javase/documentation/8u-relnotes-2225394.html

Oracle Java, OpenJDK: version 7u85.
The version 7u85 is fixed:
  http://www.oracle.com/technetwork/indexes/downloads/index.html
  http://www.oracle.com/technetwork/java/javase/7u-relnotes-515228.html

Oracle Java, OpenJDK: version 6u101.
The version 6u101 is fixed:
  http://www.oracle.com/technetwork/indexes/downloads/index.html
  http://www.oracle.com/technetwork/java/javase/documentation/overview-156328.html

Bouncy Castle: version 1.51.
The version 1.51 is fixed:
  http://www.bouncycastle.org/latest_releases.html

Bouncy Castle, Oracle Java: recommendation for elliptic curve.
It is recommended to generate a new secret key.

Brocade: solution.
The solution is indicated in information sources.

Debian: new bouncycastle packages.
New packages are available:
  Debian 7: bouncycastle 1.44+dfsg-3.1+deb7u1
  Debian 8: bouncycastle 1.49+dfsg-3+deb8u1

Fedora 22: new bouncycastle packages.
New packages are available:
  Fedora 22: bouncycastle 1.50-8.fc22

IBM Rational Application Developer for WebSphere: patch for IBM Java SDK.
A patch is indicated in information sources.

IBM WebSphere MQ: solution for Java.
The solution is indicated in information sources.

Mule ESB: version 3.5.4.
The version 3.5.4 is fixed:
  https://www.mulesoft.com/

Mule ESB: version 3.7.3.
The version 3.7.3 is fixed:
  https://www.mulesoft.com/

NetApp SnapManager: patch for Oracle Java.
A patch is available:
  SnapManager for Oracle: http://mysupport.netapp.com/NOW/cgi-bin/bol?Type=Detail&Display=959904
  SnapManager for SAP: http://mysupport.netapp.com/NOW/cgi-bin/bol?Type=Detail&Display=959905

openSUSE: new bouncycastle packages.
New packages are available:
  openSUSE 13.1: bouncycastle 1.53-8.3.1
  openSUSE 13.2: bouncycastle 1.53-13.3.1
  openSUSE Leap 42.1: bouncycastle 1.53-16.1

Oracle Communications: CPU of January 2017.
A Critical Patch Update is available:
  https://support.oracle.com/rs?type=doc&id=2213301.1
  https://support.oracle.com/rs?type=doc&id=2213291.1
  https://support.oracle.com/rs?type=doc&id=2213292.1

Oracle Communications: CPU of January 2019.
A Critical Patch Update is available:
  https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html

Oracle Communications: CPU of July 2017.
A Critical Patch Update is available.

Oracle Communications: CPU of July 2018.
A Critical Patch Update is available:
  https://support.oracle.com/rs?type=doc&id=2410237.1
  https://support.oracle.com/rs?type=doc&id=2406191.1
  https://support.oracle.com/rs?type=doc&id=2410234.1
  https://support.oracle.com/rs?type=doc&id=2408211.1
  https://support.oracle.com/rs?type=doc&id=2406689.1
  https://support.oracle.com/rs?type=doc&id=2408212.1
  https://support.oracle.com/rs?type=doc&id=2410243.1
  https://support.oracle.com/rs?type=doc&id=2410198.1

Oracle Fusion Middleware: CPU of April 2018.
A Critical Patch Update is available:
  https://support.oracle.com/rs?type=doc&id=2353306.1

Oracle Fusion Middleware: CPU of April 2020.
A Critical Patch Update is available:
  https://support.oracle.com/rs?type=doc&id=2633852.1

Oracle Fusion Middleware: CPU of January 2018.
A Critical Patch Update is available:
  https://support.oracle.com/rs?type=doc&id=2325393.1

Oracle Fusion Middleware: CPU of July 2017.
A Critical Patch Update is available:
  https://support.oracle.com/rs?type=doc&id=2261562.1

Oracle Fusion Middleware: CPU of July 2018.
A Critical Patch Update is available:
  https://support.oracle.com/rs?type=doc&id=2394520.1

Oracle Fusion Middleware: CPU of October 2017.
A Critical Patch Update is available:
  https://support.oracle.com/rs?type=doc&id=2296870.1

Red Hat JBoss A-MQ: version 6.3.
The version 6.3 is fixed:
  https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?product=jboss.amq&downloadType=distributions&version=6.3.0

Red Hat JBoss Fuse: version 6.3.
The version 6.3 is fixed:
  https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?product=jboss.fuse&downloadType=distributions&version=6.3.0

Steel Belted Radius Carrier Edition: versions 8.4R14 and 8.5R5.
Versions 8.4R14 and 8.5R5 are fixed.

Ubuntu 14.04: new bouncycastle packages.
New packages are available:
  Ubuntu 14.04 LTS: libbcmail-java 1.49+dfsg-2ubuntu0.1, libbcpg-java 1.49+dfsg-2ubuntu0.1, libbcpkix-java 1.49+dfsg-2ubuntu0.1, libbcprov-java 1.49+dfsg-2ubuntu0.1
Full bulletin, software filtering, emails, fixes, ... (Request your free trial)

Computer vulnerabilities tracking service 

Vigil@nce provides a system vulnerability announce. The Vigil@nce team tracks computer vulnerabilities impacting systems and applications.