漏洞信息详情
Bouncy Castle JCE Provider 数据伪造问题漏洞
漏洞简介
Bouncy Castle JCE Provider是一款基于Java的加密包。
Bouncy Castle JCE Provider 1.55及之前版本存在安全漏洞,该漏洞源于DSA没有充分的验证对签名的ASN.1标准编码。攻击者可利用该漏洞向签名序列中注入其他的元素并保持签名有效,进而可能向已签名的框架中注入‘不可见’的数据。
漏洞公告
目前厂商已发布升级补丁以修复漏洞,补丁获取链接:
https://github.com/bcgit/bc-java/commit/b0c3ce99d43d73a096268831d0d120ffc89eac7f#diff-3679f5a9d2b939d0d3ee1601a7774fb0
参考网址
来源:REDHAT
链接:https://access.redhat.com/errata/RHSA-2018:2669
来源:CONFIRM
链接:https://github.com/bcgit/bc-java/commit/b0c3ce99d43d73a096268831d0d120ffc89eac7f#diff-3679f5a9d2b939d0d3ee1601a7774fb0
来源:UBUNTU
链接:https://usn.ubuntu.com/3727-1/
来源:MLIST
链接:https://lists.debian.org/debian-lts-announce/2018/07/msg00009.html
来源:REDHAT
链接:https://access.redhat.com/errata/RHSA-2018:2927
来源:MLIST
链接:https://lists.apache.org/thread.html/708d94141126eac03011144a971a6411fcac16d9c248d1d535a39451@%3Csolr-user.lucene.apache.org%3E
来源:MISC
链接:https://www.oracle.com/security-alerts/cpuoct2020.html
来源:kb.juniper.net
链接:http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10939
来源:www.ibm.com
链接:https://www.ibm.com/support/pages/node/960296
来源:www.ibm.com
链接:https://www.ibm.com/blogs/psirt/security-bulletin-multiple-vulnerabilities-in-bouncy-castle-affects-apache-solr-shipped-with-ibm-operations-analytics-log-analysis/
来源:www.auscert.org.au
链接:https://www.auscert.org.au/bulletins/ESB-2019.3850/
来源:www.auscert.org.au
链接:https://www.auscert.org.au/bulletins/ESB-2020.2340/
来源:www.ibm.com
链接:https://www.ibm.com/blogs/psirt/security-bulletin-multiple-bouncy-castle-vulnerabilities-affect-ibm-sterling-b2b-integrator/
来源:www.auscert.org.au
链接:https://www.auscert.org.au/bulletins/ESB-2019.2561/
受影响实体
- Bouncycastle Legion-Of-The-Bouncy-Castle-Java-Crytography-Api:1.55<!--2000-1-1-->
补丁
- Bouncy Castle JCE Provider 安全漏洞的修复措施<!--2018-6-1-->
还没有评论,来说两句吧...