The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a vigilance database and tools to fix them.

Vulnerability of Bouncy Castle: multiple vulnerabilities

Synthesis of the vulnerability 

An attacker can use several vulnerabilities of Bouncy Castle.
Impacted systems: Bouncy Castle JCE, Debian, Junos Space, Juniper SBR, openSUSE Leap, Ubuntu.
Severity of this alert: 3/4.
Number of vulnerabilities in this bulletin: 8.
Creation date: 22/12/2016.
Références of this alert: CERTFR-2019-AVI-325, CVE-2016-1000338, CVE-2016-1000339, CVE-2016-1000340, CVE-2016-1000341, CVE-2016-1000342, CVE-2016-1000343, CVE-2016-1000344, CVE-2016-1000345, CVE-2016-1000346, CVE-2016-1000352, DLA-1418-1, JSA10939, JSA11023, openSUSE-SU-2018:1689-1, RHSA-2018:2669-01, USN-3727-1, VIGILANCE-VUL-21455.

Description of the vulnerability 

Several vulnerabilities were announced in Bouncy Castle.

An attacker can tamper with DSA/ECDSA signed data, without failure of the signature check. [severity:3/4; CVE-2016-1000338, CVE-2016-1000342]

A local attacker can measure the AES implementation speed, in order to get information about the secret key. [severity:1/4; CVE-2016-1000339]

The ECDH implementation of arithmetic for large integers includes carry propagation bugs. [severity:1/4; CVE-2016-1000340]

An attacker can time a DSA signature in order to get information about the private key. [severity:1/4; CVE-2016-1000341]

The default size of DSA keys is too small. [severity:1/4; CVE-2016-1000343]

The ECIES and DHIES algorithm accept the ECB mode. [severity:1/4; CVE-2016-1000344, CVE-2016-1000352]

An attacker can time decryption of blindly modified ciphertext, in order to get information about the corresponding plain text. [severity:1/4; CVE-2016-1000345]

An attacker can make use invalid DH public keys, in order to get information about the related private keys. [severity:1/4; CVE-2016-1000346]
Full bulletin, software filtering, emails, fixes, ... (Request your free trial)

This computer threat bulletin impacts software or systems such as Bouncy Castle JCE, Debian, Junos Space, Juniper SBR, openSUSE Leap, Ubuntu.

Our Vigil@nce team determined that the severity of this security threat is important.

The trust level is of type confirmed by the editor, with an origin of document.

This bulletin is about 8 vulnerabilities.

An attacker with a expert ability can exploit this computer vulnerability alert.

Solutions for this threat 

Bouncy Castle: version 1.56.
The version 1.56 is fixed:
  http://www.bouncycastle.org/latest_releases.html

Debian 8: new bouncycastle packages.
New packages are available:
  Debian 8: bouncycastle 1.49+dfsg-3+deb8u3

Junos Space: version 20.1R1.
The version 20.1R1 is fixed:
  https://www.juniper.net/support/downloads/

openSUSE Leap 42.3: new bouncycastle packages.
New packages are available:
  openSUSE Leap 42.3: bouncycastle 1.59-23.3.1

Red Hat JBoss Fuse: version 7.1.
The version 7.1 is fixed:
  https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?product=jboss.fuse&downloadType=distributions&version=7.1.0

Steel Belted Radius Carrier Edition: versions 8.4R14 and 8.5R5.
Versions 8.4R14 and 8.5R5 are fixed.

Ubuntu 14.04: new bouncycastle packages.
New packages are available:
  Ubuntu 14.04 LTS: libbcmail-java 1.49+dfsg-2ubuntu0.1, libbcpg-java 1.49+dfsg-2ubuntu0.1, libbcpkix-java 1.49+dfsg-2ubuntu0.1, libbcprov-java 1.49+dfsg-2ubuntu0.1
Full bulletin, software filtering, emails, fixes, ... (Request your free trial)

Computer vulnerabilities tracking service 

Vigil@nce provides systems vulnerabilities bulletins. The Vigil@nce security watch publishes vulnerability bulletins about threats impacting the information system.