CVE-2015-7940

The Bouncy Castle Java library before 1.51 does not validate a point is withing the elliptic curve, which makes it easier for remote attackers to obtain private keys via a series of crafted elliptic curve Diffie Hellman (ECDH) key exchanges, aka an "invalid curve attack."
References
Link Resource
http://lists.fedoraproject.org/pipermail/package-announce/2016-January/174915.html
http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00012.html Third Party Advisory
http://rhn.redhat.com/errata/RHSA-2016-2035.html
http://rhn.redhat.com/errata/RHSA-2016-2036.html
http://web-in-security.blogspot.ca/2015/09/practical-invalid-curve-attacks.html Technical Description
http://www.debian.org/security/2015/dsa-3417
http://www.openwall.com/lists/oss-security/2015/10/22/7 Third Party Advisory VDB Entry
http://www.openwall.com/lists/oss-security/2015/10/22/9 Third Party Advisory VDB Entry
http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html
http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html
http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html
http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html
http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html Third Party Advisory
http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
http://www.securityfocus.com/bid/79091
http://www.securitytracker.com/id/1037036
http://www.securitytracker.com/id/1037046
http://www.securitytracker.com/id/1037053
https://usn.ubuntu.com/3727-1/
https://www.oracle.com/security-alerts/cpuapr2020.html
https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html
http://lists.fedoraproject.org/pipermail/package-announce/2016-January/174915.html
http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00012.html Third Party Advisory
http://rhn.redhat.com/errata/RHSA-2016-2035.html
http://rhn.redhat.com/errata/RHSA-2016-2036.html
http://web-in-security.blogspot.ca/2015/09/practical-invalid-curve-attacks.html Technical Description
http://www.debian.org/security/2015/dsa-3417
http://www.openwall.com/lists/oss-security/2015/10/22/7 Third Party Advisory VDB Entry
http://www.openwall.com/lists/oss-security/2015/10/22/9 Third Party Advisory VDB Entry
http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html
http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html
http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html
http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html
http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html Third Party Advisory
http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
http://www.securityfocus.com/bid/79091
http://www.securitytracker.com/id/1037036
http://www.securitytracker.com/id/1037046
http://www.securitytracker.com/id/1037053
https://usn.ubuntu.com/3727-1/
https://www.oracle.com/security-alerts/cpuapr2020.html
https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*
cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*

Configuration 2 (hide)

cpe:2.3:a:bouncycastle:bouncy_castle_crypto_package:*:*:*:*:*:*:*:*

Configuration 3 (hide)

OR cpe:2.3:a:oracle:application_testing_suite:12.5.0.1:*:*:*:*:*:*:*
cpe:2.3:a:oracle:application_testing_suite:12.5.0.2:*:*:*:*:*:*:*
cpe:2.3:a:oracle:application_testing_suite:12.5.0.3:*:*:*:*:*:*:*
cpe:2.3:a:oracle:enterprise_manager_ops_center:12.1.4:*:*:*:*:*:*:*
cpe:2.3:a:oracle:enterprise_manager_ops_center:12.2.2:*:*:*:*:*:*:*
cpe:2.3:a:oracle:peoplesoft_enterprise_peopletools:8.54:*:*:*:*:*:*:*
cpe:2.3:a:oracle:peoplesoft_enterprise_peopletools:8.55:*:*:*:*:*:*:*
cpe:2.3:a:oracle:virtual_desktop_infrastructure:3.5.2:*:*:*:*:*:*:*

History

21 Nov 2024, 02:37

Type Values Removed Values Added
References () http://lists.fedoraproject.org/pipermail/package-announce/2016-January/174915.html - () http://lists.fedoraproject.org/pipermail/package-announce/2016-January/174915.html -
References () http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00012.html - Third Party Advisory () http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00012.html - Third Party Advisory
References () http://rhn.redhat.com/errata/RHSA-2016-2035.html - () http://rhn.redhat.com/errata/RHSA-2016-2035.html -
References () http://rhn.redhat.com/errata/RHSA-2016-2036.html - () http://rhn.redhat.com/errata/RHSA-2016-2036.html -
References () http://web-in-security.blogspot.ca/2015/09/practical-invalid-curve-attacks.html - Technical Description () http://web-in-security.blogspot.ca/2015/09/practical-invalid-curve-attacks.html - Technical Description
References () http://www.debian.org/security/2015/dsa-3417 - () http://www.debian.org/security/2015/dsa-3417 -
References () http://www.openwall.com/lists/oss-security/2015/10/22/7 - Third Party Advisory, VDB Entry () http://www.openwall.com/lists/oss-security/2015/10/22/7 - Third Party Advisory, VDB Entry
References () http://www.openwall.com/lists/oss-security/2015/10/22/9 - Third Party Advisory, VDB Entry () http://www.openwall.com/lists/oss-security/2015/10/22/9 - Third Party Advisory, VDB Entry
References () http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html - () http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html -
References () http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html - () http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html -
References () http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html - () http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html -
References () http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html - () http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html -
References () http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html - Third Party Advisory () http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html - Third Party Advisory
References () http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html - () http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html -
References () http://www.securityfocus.com/bid/79091 - () http://www.securityfocus.com/bid/79091 -
References () http://www.securitytracker.com/id/1037036 - () http://www.securitytracker.com/id/1037036 -
References () http://www.securitytracker.com/id/1037046 - () http://www.securitytracker.com/id/1037046 -
References () http://www.securitytracker.com/id/1037053 - () http://www.securitytracker.com/id/1037053 -
References () https://usn.ubuntu.com/3727-1/ - () https://usn.ubuntu.com/3727-1/ -
References () https://www.oracle.com/security-alerts/cpuapr2020.html - () https://www.oracle.com/security-alerts/cpuapr2020.html -
References () https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html - () https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html -

Information

Published : 2015-11-09 16:59

Updated : 2024-11-21 02:37


NVD link : CVE-2015-7940

Mitre link : CVE-2015-7940

CVE.ORG link : CVE-2015-7940


JSON object : View

Products Affected

opensuse

  • opensuse
  • leap

bouncycastle

  • bouncy_castle_crypto_package

oracle

  • enterprise_manager_ops_center
  • application_testing_suite
  • peoplesoft_enterprise_peopletools
  • virtual_desktop_infrastructure
CWE
CWE-200

Exposure of Sensitive Information to an Unauthorized Actor

CWE-310

Cryptographic Issues