gsylvie / t

t
0 stars 0 forks source link

CVE-2024-30171 (Medium) detected in bcprov-jdk14-1.38.jar #399

Open mend-bolt-for-github[bot] opened 5 months ago

mend-bolt-for-github[bot] commented 5 months ago

CVE-2024-30171 - Medium Severity Vulnerability

Vulnerable Library - bcprov-jdk14-1.38.jar

The Bouncy Castle Crypto package is a Java implementation of cryptographic algorithms. This jar contains JCE provider and lightweight API for the Bouncy Castle Cryptography APIs for JDK 1.4.

Library home page: http://www.bouncycastle.org/java.html

Path to dependency file: /t/sub1/pom.xml

Path to vulnerable library: /2/repository/org/bouncycastle/bcprov-jdk14/1.38/bcprov-jdk14-1.38.jar,/2/repository/bouncycastle/bcprov-jdk14/138/bcprov-jdk14-138.jar

Dependency Hierarchy: - :x: **bcprov-jdk14-1.38.jar** (Vulnerable Library)

Found in HEAD commit: 37c7d89138d443bae9926a0184046f8d8c7dda51

Found in base branch: master

Vulnerability Details

BouncyCastle before version 1.78 is vulnerable to timing side-channel attacks against RSA decryption (both PKCS#1v1.5 and OAEP).

Publish Date: 2024-03-24

URL: CVE-2024-30171

CVSS 3 Score Details (5.3)

Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: High - Privileges Required: Low - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: None - Availability Impact: None

For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Release Date: 2024-03-24

Fix Resolution: org.bouncycastle:bcprov-jdk15to18:1.78, org.bouncycastle:bcprov-jdk18on:1.78


Step up your Open Source Security Game with Mend here