5 Medium
CVSS2
Access Vector
NETWORK
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
NONE
Availability Impact
NONE
AV:N/AC:L/Au:N/C:P/I:N/A:N
The Bouncy Castle Java library before 1.51 does not validate that a point
is within the elliptic curve, which makes it easier for remote attackers
to obtain private keys via a series of crafted elliptic curve Diffie
Hellman (ECDH) key exchanges, aka an “invalid curve attack.”
For Debian 6 Squeeze, this issue has been fixed in version
1.44+dfsg-2+deb6u1 of bouncycastle.
Many thanks to upstream author Peter Dettmann who reviewed the backport
that we prepared.
CPE | Name | Operator | Version |
---|---|---|---|
bouncycastle | eq | 1.44+dfsg-2 |