Skip to content

Improper Input Validation in Bouncy Castle

Moderate severity GitHub Reviewed Published May 14, 2022 to the GitHub Advisory Database • Updated Jan 27, 2023

Package

maven org.bouncycastle:bcprov-jdk15on (Maven)

Affected versions

< 1.48

Patched versions

1.48

Description

The TLS implementation in the Bouncy Castle Java library before 1.48 and C# library before 1.8 does not properly consider timing side-channel attacks on a noncompliant MAC check operation during the processing of malformed CBC padding, which allows remote attackers to conduct distinguishing attacks and plaintext-recovery attacks via statistical analysis of timing data for crafted packets, a related issue to CVE-2013-0169.

References

Published by the National Vulnerability Database Feb 8, 2013
Published to the GitHub Advisory Database May 14, 2022
Reviewed Jul 8, 2022
Last updated Jan 27, 2023

Severity

Moderate

Weaknesses

CVE ID

CVE-2013-1624

GHSA ID

GHSA-8353-fgcr-xfhx

Source code

No known source code
Checking history
See something to contribute? Suggest improvements for this vulnerability.