製品・ソフトウェアに関する情報
Bouncy Castle JCE Provider における暗号に関する脆弱性
Title Bouncy Castle JCE Provider における暗号に関する脆弱性
Summary

Bouncy Castle JCE Provider には、暗号に関する脆弱性が存在します。

Possible impacts 情報を取得される可能性があります。
Solution

ベンダより正式な対策が公開されています。ベンダ情報を参照して適切な対策を実施してください。

Publication Date Nov. 1, 2016, midnight
Registration Date Aug. 6, 2018, 2:11 p.m.
Last Update Aug. 6, 2018, 2:11 p.m.
CVSS3.0 : 警告
Score 5.3
Vector CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
CVSS2.0 : 警告
Score 5
Vector AV:N/AC:L/Au:N/C:P/I:N/A:N
Affected System
Debian
Debian GNU/Linux 
Bouncy Castle
Bouncy Castle Java Cryptography API 1.55 およびそれ以前
CVE (情報セキュリティ 共通脆弱性識別子)
CWE (共通脆弱性タイプ一覧)
ベンダー情報
Change Log
No Changed Details Date of change
1 [2018年08月06日]
  掲載
Aug. 6, 2018, 2:11 p.m.

NVD Vulnerability Information
CVE-2016-1000339
Summary

In the Bouncy Castle JCE Provider version 1.55 and earlier the primary engine class used for AES was AESFastEngine. Due to the highly table driven approach used in the algorithm it turns out that if the data channel on the CPU can be monitored the lookup table accesses are sufficient to leak information on the AES key being used. There was also a leak in AESEngine although it was substantially less. AESEngine has been modified to remove any signs of leakage (testing carried out on Intel X86-64) and is now the primary AES class for the BC JCE provider from 1.56. Use of AESFastEngine is now only recommended where otherwise deemed appropriate.

Publication Date June 4, 2018, 10:29 p.m.
Registration Date Jan. 26, 2021, 2:04 p.m.
Last Update Nov. 21, 2024, 11:43 a.m.
Affected software configurations
Configuration1 or higher or less more than less than
cpe:2.3:a:bouncycastle:legion-of-the-bouncy-castle-java-crytography-api:*:*:*:*:*:*:*:* 1.55
Configuration2 or higher or less more than less than
cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
Related information, measures and tools
Common Vulnerabilities List