 
                        We found results for “”
CVE-2016-1000341
Good to know:
 
                                     
                                    Date: June 4, 2018
In the Bouncy Castle JCE Provider version 1.55 and earlier DSA signature generation is vulnerable to timing attack. Where timings can be closely observed for the generation of signatures, the lack of blinding in 1.55, or earlier, may allow an attacker to gain information about the signature's k value and ultimately the private value as well.
Language: Java
Severity Score
Related Resources (14)
Severity Score
Weakness Type (CWE)
Time and State
CWE-361Top Fix
 
                                    Upgrade Version
Upgrade to version org.bouncycastle:bcprov-jdk15on:1.56;org.bouncycastle:bcprov-jdk14:1.56
CVSS v3.1
| Base Score: |  | 
|---|---|
| Attack Vector (AV): | NETWORK | 
| Attack Complexity (AC): | HIGH | 
| Privileges Required (PR): | NONE | 
| User Interaction (UI): | NONE | 
| Scope (S): | UNCHANGED | 
| Confidentiality (C): | HIGH | 
| Integrity (I): | NONE | 
| Availability (A): | NONE | 
CVSS v2
| Base Score: |  | 
|---|---|
| Access Vector (AV): | NETWORK | 
| Access Complexity (AC): | MEDIUM | 
| Authentication (AU): | NONE | 
| Confidentiality (C): | PARTIAL | 
| Integrity (I): | NONE | 
| Availability (A): | NONE | 
| Additional information: | 
 Vulnerabilities
                        Vulnerabilities
                 Projects
                        Projects
                 Vulnerability Disclosure
                        Vulnerability Disclosure
                 About Us
                    About Us
                 Contact Us
                    Contact Us
                

