CVE-2016-1000343

In the Bouncy Castle JCE Provider version 1.55 and earlier the DSA key pair generator generates a weak private key if used with default values. If the JCA key pair generator is not explicitly initialised with DSA parameters, 1.55 and earlier generates a private value assuming a 1024 bit key size. In earlier releases this can be dealt with by explicitly passing parameters to the key pair generator.
Configurations

Configuration 1 (hide)

cpe:2.3:a:bouncycastle:legion-of-the-bouncy-castle-java-crytography-api:*:*:*:*:*:*:*:*

Configuration 2 (hide)

cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*

History

21 Nov 2024, 02:43

Type Values Removed Values Added
References () https://access.redhat.com/errata/RHSA-2018:2669 - () https://access.redhat.com/errata/RHSA-2018:2669 -
References () https://access.redhat.com/errata/RHSA-2018:2927 - () https://access.redhat.com/errata/RHSA-2018:2927 -
References () https://github.com/bcgit/bc-java/commit/50a53068c094d6cff37659da33c9b4505becd389#diff-5578e61500abb2b87b300d3114bdfd7d - Patch, Third Party Advisory () https://github.com/bcgit/bc-java/commit/50a53068c094d6cff37659da33c9b4505becd389#diff-5578e61500abb2b87b300d3114bdfd7d - Patch, Third Party Advisory
References () https://lists.apache.org/thread.html/708d94141126eac03011144a971a6411fcac16d9c248d1d535a39451%40%3Csolr-user.lucene.apache.org%3E - () https://lists.apache.org/thread.html/708d94141126eac03011144a971a6411fcac16d9c248d1d535a39451%40%3Csolr-user.lucene.apache.org%3E -
References () https://lists.debian.org/debian-lts-announce/2018/07/msg00009.html - Third Party Advisory () https://lists.debian.org/debian-lts-announce/2018/07/msg00009.html - Third Party Advisory
References () https://security.netapp.com/advisory/ntap-20181127-0004/ - () https://security.netapp.com/advisory/ntap-20181127-0004/ -
References () https://usn.ubuntu.com/3727-1/ - () https://usn.ubuntu.com/3727-1/ -
References () https://www.oracle.com/security-alerts/cpuoct2020.html - () https://www.oracle.com/security-alerts/cpuoct2020.html -

07 Nov 2023, 02:29

Type Values Removed Values Added
References
  • {'url': 'https://lists.apache.org/thread.html/708d94141126eac03011144a971a6411fcac16d9c248d1d535a39451@%3Csolr-user.lucene.apache.org%3E', 'name': '[lucene-solr-user] 20190104 Re: SOLR v7 Security Issues Caused Denial of Use - Sonatype Application Composition Report', 'tags': [], 'refsource': 'MLIST'}
  • () https://lists.apache.org/thread.html/708d94141126eac03011144a971a6411fcac16d9c248d1d535a39451%40%3Csolr-user.lucene.apache.org%3E -

Information

Published : 2018-06-04 13:29

Updated : 2024-11-21 02:43


NVD link : CVE-2016-1000343

Mitre link : CVE-2016-1000343

CVE.ORG link : CVE-2016-1000343


JSON object : View

Products Affected

debian

  • debian_linux

bouncycastle

  • legion-of-the-bouncy-castle-java-crytography-api
CWE
CWE-310

Cryptographic Issues