Skip to content

bcprov-jdk15on and bcprov-ext-jdk15on 1.69 sonatype-2019-0673 vulnerability  #2168

@amahfouz1

Description

@amahfouz1

Describe the bug
Based on SONATYPE-2019-0673, there is no upgrade path for this dependency. Is there any alternative option or a workaround to address this vulnerability? Thanks!

Vulnerability
Issue
sonatype-2019-0673
Severity
Sonatype CVSS 3: 3.7
CVE CVSS 2.0: 0.0
Weakness
Sonatype CWE: [400](https://cwe.mitre.org/data/definitions/400.html)
Source
Sonatype Data Research
Categories
Data
Description
Explanation
Bouncy Castle is vulnerable to Denial of Service (DoS). The Dump.class file utilises FileInputStreams objects when reading from user-provided files, but fails to close these streams properly. This can lead to resource leaks, potentially enabling an attacker to exhaust resources by providing a crafted file as an input to the application, thereby triggering a DoS condition.

Detection
The application is vulnerable by using this component.

Recommendation
There is no non-vulnerable upgrade path for this component. We recommend investigating alternative components or potential mitigating control.

Root Cause
bugvm-dist-1.0.8.tar.gz <= bugvm-1.0.8/lib/bugvm-dist-compiler.jar <= org/bouncycastle/asn1/util/Dump.class : [1.46, )
Advisories
Project: https://github.com/bcgit/bc-java/issues/634
CVSS Details
Sonatype CVSS 3: 3.7
CVSS Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L

https://cwe.mitre.org/data/definitions/400.html

Client Version
14.0.1

Metadata

Metadata

Assignees

No one assigned

    Labels

    lifecycle/rottenDenotes an issue or PR that has aged beyond stale and will be auto-closed.

    Type

    No type

    Projects

    No projects

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions