ESB-2018.1969 - [Debian] bouncycastle: Multiple vulnerabilities 2018-07-09

Printable version
PGP/GPG verifiable version

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2018.1969
                 [DLA 1418-1] bouncycastle security update
                                9 July 2018

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           bouncycastle
Publisher:         Debian
Operating System:  Debian GNU/Linux 8
Impact/Access:     Access Privileged Data         -- Remote/Unauthenticated
                   Provide Misleading Information -- Remote/Unauthenticated
                   Reduced Security               -- Remote/Unauthenticated
Resolution:        Patch/Upgrade
CVE Names:         CVE-2016-1000346 CVE-2016-1000345 CVE-2016-1000343
                   CVE-2016-1000342 CVE-2016-1000341 CVE-2016-1000339
                   CVE-2016-1000338  

Reference:         ESB-2018.1848

Original Bulletin: 
   https://lists.debian.org/debian-lts-announce/2018/07/msg00009.html

- --------------------------BEGIN INCLUDED TEXT--------------------

- -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

Package        : bouncycastle
Version        : 1.49+dfsg-3+deb8u3
CVE ID         : CVE-2016-1000338 CVE-2016-1000339 CVE-2016-1000341
                 CVE-2016-1000342 CVE-2016-1000343 CVE-2016-1000345
                 CVE-2016-1000346

Several security vulnerabilities were found in Bouncy
Castle, a Java implementation of cryptographic algorithms.

CVE-2016-1000338
    DSA does not fully validate ASN.1 encoding of signature on
    verification. It is possible to inject extra elements in the
    sequence making up the signature and still have it validate, which
    in some cases may allow the introduction of 'invisible' data into a
    signed structure.

CVE-2016-1000339
    Previously the primary engine class used for AES was AESFastEngine.
    Due to the highly table driven approach used in the algorithm it
    turns out that if the data channel on the CPU can be monitored the
    lookup table accesses are sufficient to leak information on the AES
    key being used. There was also a leak in AESEngine although it was
    substantially less. AESEngine has been modified to remove any signs
    of leakage and is now the primary AES class for the BC JCE provider.
    Use of AESFastEngine is now only recommended where otherwise deemed
    appropriate.

CVE-2016-1000341
    DSA signature generation is vulnerable to timing attack. Where
    timings can be closely observed for the generation of signatures,
    the lack of blinding may allow an attacker to gain information about
    the signature's k value and ultimately the private value as well.

CVE-2016-1000342
    ECDSA does not fully validate ASN.1 encoding of signature on
    verification. It is possible to inject extra elements in the
    sequence making up the signature and still have it validate, which
    in some cases may allow the introduction of 'invisible' data into a
    signed structure.

CVE-2016-1000343
    The DSA key pair generator generates a weak private key if used with
    default values. If the JCA key pair generator is not explicitly
    initialised with DSA parameters, 1.55 and earlier generates a
    private value assuming a 1024 bit key size. In earlier releases this
    can be dealt with by explicitly passing parameters to the key pair
    generator.

CVE-2016-1000345
    The DHIES/ECIES CBC mode is vulnerable to padding oracle attack. In
    an environment where timings can be easily observed, it is possible
    with enough observations to identify when the decryption is failing
    due to padding.

CVE-2016-1000346
    In the Bouncy Castle JCE Provider the other party DH public key is
    not fully validated. This can cause issues as invalid keys can be
    used to reveal details about the other party's private key where
    static Diffie-Hellman is in use. As of this release the key
    parameters are checked on agreement calculation.

For Debian 8 "Jessie", these problems have been fixed in version
1.49+dfsg-3+deb8u3.

We recommend that you upgrade your bouncycastle packages.

Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS
- -----BEGIN PGP SIGNATURE-----
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=wMaJ
- -----END PGP SIGNATURE-----

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        https://www.auscert.org.au/bulletins/

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967
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=rv3y
-----END PGP SIGNATURE-----

« Back to bulletins