Closed mend-for-github-com[bot] closed 3 years ago
:heavy_check_mark: This issue was automatically closed by WhiteSource because the vulnerable library in the specific branch(es) was either marked as ignored or it is no longer part of the WhiteSource inventory.
WS-2019-0509 - Medium Severity Vulnerability
Vulnerable Libraries - bcprov-jdk15on-1.46.jar, bcprov-jdk14-138.jar
bcprov-jdk15on-1.46.jar
The Bouncy Castle Crypto package is a Java implementation of cryptographic algorithms. This jar contains JCE provider and lightweight API for the Bouncy Castle Cryptography APIs for JDK 1.5 to JDK 1.7.
Library home page: http://www.bouncycastle.org/java.html
Path to dependency file: ready-jira-plugin/pom.xml
Path to vulnerable library: /home/wss-scanner/.m2/repository/org/bouncycastle/bcprov-jdk15on/1.46/bcprov-jdk15on-1.46.jar
Dependency Hierarchy: - ready-api-soapui-pro-3.5.0.jar (Root Library) - bctsp-jdk15on-1.46.jar - :x: **bcprov-jdk15on-1.46.jar** (Vulnerable Library)
bcprov-jdk14-138.jar
The Bouncy Castle Crypto package is a Java implementation of cryptographic algorithms. The package is organised so that it contains a light-weight API suitable for use in any environment (including the newly released J2ME) with the additional infrastructure to conform the algorithms to the JCE framework.
Library home page: http://www.bouncycastle.org/java.html
Path to dependency file: ready-jira-plugin/pom.xml
Path to vulnerable library: /home/wss-scanner/.m2/repository/org/bouncycastle/bcprov-jdk14/1.38/bcprov-jdk14-1.38.jar,/home/wss-scanner/.m2/repository/bouncycastle/bcprov-jdk14/138/bcprov-jdk14-138.jar
Dependency Hierarchy: - ready-api-soapui-pro-3.5.0.jar (Root Library) - flying-saucer-pdf-9.0.7.jar - itext-2.1.7.jar - bctsp-jdk14-1.38.jar - :x: **bcprov-jdk14-138.jar** (Vulnerable Library)
Found in base branch: master
Vulnerability Details
Bouncy Castle through 1.68 is vulnerable to Denial of Service (DoS). The Dump.class file utilizes the FileInputStream object when reading from user-provided files, but doesn't close these streams properly.
Publish Date: 2019-12-24
URL: WS-2019-0509
CVSS 3 Score Details (5.3)
Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: None - Availability Impact: Low
For more information on CVSS3 Scores, click here.