Information Exposure Affecting bouncycastle package, versions <1.61-1


Severity

Recommended
0.0
medium
0
10

Snyk's Security Team recommends NVD's CVSS assessment. Learn more

Threat Intelligence

EPSS
0.07% (34th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-DEBIANUNSTABLE-BOUNCYCASTLE-1035714
  • published4 Nov 2020
  • disclosed2 Nov 2020

Introduced: 2 Nov 2020

CVE-2020-26939  (opens in a new tab)
CWE-203  (opens in a new tab)

How to fix?

Upgrade Debian:unstable bouncycastle to version 1.61-1 or higher.

NVD Description

Note: Versions mentioned in the description apply only to the upstream bouncycastle package and not the bouncycastle package as distributed by Debian. See How to fix? for Debian:unstable relevant fixed versions and status.

In Legion of the Bouncy Castle BC before 1.61 and BC-FJA before 1.0.1.2, attackers can obtain sensitive information about a private exponent because of Observable Differences in Behavior to Error Inputs. This occurs in org.bouncycastle.crypto.encodings.OAEPEncoding. Sending invalid ciphertext that decrypts to a short payload in the OAEP Decoder could result in the throwing of an early exception, potentially leaking some information about the private exponent of the RSA private key performing the encryption.

CVSS Scores

version 3.1