Information Exposure Affecting org.bouncycastle:bcprov-ext-jdk14 Open this link in a new tab package, versions [,1.61)


0.0
high
  • Attack Complexity

    Low

  • Confidentiality

    High

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • snyk-id

    SNYK-JAVA-ORGBOUNCYCASTLE-1035562

  • published

    3 Nov 2020

  • disclosed

    3 Nov 2020

  • credit

    Unknown

How to fix?

Upgrade org.bouncycastle:bcprov-ext-jdk14 to version 1.61 or higher.

Overview

org.bouncycastle:bcprov-ext-jdk14 is a Java implementation of cryptographic algorithms.

Affected versions of this package are vulnerable to Information Exposure. Attackers can obtain sensitive information about a private exponent because of Observable Differences in Behavior to Error Inputs. This occurs in org.bouncycastle.crypto.encodings.OAEPEncoding. Sending invalid ciphertext that decrypts to a short payload in the OAEP Decoder could result in the throwing of an early exception, potentially leaking some information about the private exponent of the RSA private key performing the encryption.