CVE-2016-1000343
bouncycastle: DSA key pair generator generates a weak private key by default
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
In the Bouncy Castle JCE Provider version 1.55 and earlier the DSA key pair generator generates a weak private key if used with default values. If the JCA key pair generator is not explicitly initialised with DSA parameters, 1.55 and earlier generates a private value assuming a 1024 bit key size. In earlier releases this can be dealt with by explicitly passing parameters to the key pair generator.
En Bouncy Castle JCE Provider en versiones 1.55 y anteriores, el generador de pares de claves DSA genera una clave privada débil si se emplea con los valores por defecto. Si el generador de pares de claves JCA no se inicializa explícitamente con parámetros DSA, las versiones 1.55 y anteriores generan un valor privado asumiendo un tamaño de clave de 1024 bits. En versiones anteriores, esto puede mitigarse pasando explícitamente parámetros al generador de pares de claves.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2018-06-04 CVE Reserved
- 2018-06-04 CVE Published
- 2024-08-06 CVE Updated
- 2024-09-07 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-310: Cryptographic Issues
- CWE-338: Use of Cryptographically Weak Pseudo-Random Number Generator (PRNG)
CAPEC
References (10)
URL | Tag | Source |
---|---|---|
https://lists.apache.org/thread.html/708d94141126eac03011144a971a6411fcac16d9c248d1d535a39451%40%3Csolr-user.lucene.apache.org%3E | Mailing List | |
https://lists.debian.org/debian-lts-announce/2018/07/msg00009.html | Mailing List | |
https://security.netapp.com/advisory/ntap-20181127-0004 | X_refsource_confirm | |
https://www.oracle.com/security-alerts/cpuoct2020.html | X_refsource_misc |
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
https://github.com/bcgit/bc-java/commit/50a53068c094d6cff37659da33c9b4505becd389#diff-5578e61500abb2b87b300d3114bdfd7d | 2023-11-07 |
URL | Date | SRC |
---|---|---|
https://access.redhat.com/errata/RHSA-2018:2669 | 2023-11-07 | |
https://access.redhat.com/errata/RHSA-2018:2927 | 2023-11-07 | |
https://usn.ubuntu.com/3727-1 | 2023-11-07 | |
https://access.redhat.com/security/cve/CVE-2016-1000343 | 2018-10-16 | |
https://bugzilla.redhat.com/show_bug.cgi?id=1588721 | 2018-10-16 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Bouncycastle Search vendor "Bouncycastle" | Legion-of-the-bouncy-castle-java-crytography-api Search vendor "Bouncycastle" for product "Legion-of-the-bouncy-castle-java-crytography-api" | <= 1.55 Search vendor "Bouncycastle" for product "Legion-of-the-bouncy-castle-java-crytography-api" and version " <= 1.55" | - |
Affected
| ||||||
Debian Search vendor "Debian" | Debian Linux Search vendor "Debian" for product "Debian Linux" | 8.0 Search vendor "Debian" for product "Debian Linux" and version "8.0" | - |
Affected
|