CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
NONE
Availability Impact
NONE
AV:N/AC:L/Au:N/C:P/I:N/A:N
AI Score
Confidence
High
EPSS
Percentile
64.8%
Package : bouncycastle
Version : 1.44+dfsg-2+deb6u1
CVE ID : CVE-2015-7940
Debian Bug : 802671
The Bouncy Castle Java library before 1.51 does not validate that a point
is within the elliptic curve, which makes it easier for remote attackers
to obtain private keys via a series of crafted elliptic curve Diffie
Hellman (ECDH) key exchanges, aka an "invalid curve attack."
For Debian 6 “Squeeze”, this issue has been fixed in version
1.44+dfsg-2+deb6u1 of bouncycastle.
Many thanks to upstream author Peter Dettmann who reviewed the backport
that we prepared.
–
Raphaël Hertzog ◈ Debian Developer
Support Debian LTS: http://www.freexian.com/services/debian-lts.html
Learn to master Debian: http://debian-handbook.info/get/
Attachment:
signature.asc
Description: PGP signature