CVE-2018-5382
CVSSN/A
发布时间 :2018-04-16 10:29:01
修订时间 :2018-04-17 21:29:02
NMS    

[原文]Bouncy Castle BKS version 1 keystore (BKS-V1) files use an HMAC that is only 16 bits long, which can allow an attacker to compromise the integrity of a BKS-V1 keystore. All BKS-V1 keystores are vulnerable. Bouncy Castle release 1.47 introduces BKS version 2, which uses a 160-bit MAC.


[CNNVD]CNNVD数据暂缺。


[机译]译文暂缺.

- CVSS (基础分值)

CVSS暂不可用

- CPE (受影响的平台与产品)

产品及版本信息(CPE)暂不可用

- OVAL (用于检测的技术细节)

未找到相关OVAL定义

- 官方数据库链接

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5382
(官方数据源) MITRE
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-5382
(官方数据源) NVD

- 其它链接及资源

http://www.securityfocus.com/bid/103453
(UNKNOWN)  BID  103453
https://www.bouncycastle.org/releasenotes.html
(UNKNOWN)  MISC  https://www.bouncycastle.org/releasenotes.html
https://www.kb.cert.org/vuls/id/306792
(UNKNOWN)  CERT-VN  VU#306792

- 漏洞信息

Bouncy Castle BKS-V1 CVE-2018-5382 Security Weakness
Design Error 103453
No Yes
2018-03-19 12:00:00 2018-03-19 12:00:00
Will Dormann

- 受影响的程序版本

Bouncy Castle BKS-V1 0

- 漏洞讨论

Bouncy Castle BKS-V1 is prone to a security weakness.

Successfully exploiting this issue will allow attackers to perform unauthorized actions; this may aid in launching further attacks.

- 漏洞利用

The researcher has created a proof-of-concept to demonstrate the issue. Please see the references for more information.

- 解决方案

Updates are available. Please see the references or vendor advisory for more information.

- 相关参考

 

 

关于SCAP中文社区

SCAP中文社区是国内第一个以SCAP为主题的中文开放社区。了解更多信息,请查阅[关于本站]

版权声明

CVE/CWE/OVAL均为MITRE公司的注册商标,它们的官方数据源均保存在MITRE公司的相关网站