The Bouncy Castle Java library before 1.51 does not validate a point is withing the elliptic curve, which makes it easier for remote attackers to obtain private keys via a series of crafted elliptic curve Diffie Hellman (ECDH) key exchanges, aka an "invalid curve attack."
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
Information
Published : 2015-11-09 08:59
Updated : 2019-01-16 11:29
NVD link : CVE-2015-7940
Mitre link : CVE-2015-7940
JSON object : View
Products Affected
oracle
- peoplesoft_enterprise_peopletools
- application_testing_suite
- virtual_desktop_infrastructure
- enterprise_manager_ops_center
opensuse
- leap
- opensuse
bouncycastle
- bouncy_castle_crypto_package