[ 
https://issues.apache.org/jira/browse/TIKA-2699?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=16563444#comment-16563444
 ] 

Abhijit Rajwade commented on TIKA-2699:
---------------------------------------

CVE-2016-1000352 info
 
Issue
[CVE-2016-1000352|http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2016-1000352]
Source
National Vulnerability Database
Severity
CVE CVSS 3.0: 7.4
CVE CVSS 2.0: 5.8
Sonatype CVSS 3.0: 4.8
Weakness
CVE CWE: [310|https://cwe.mitre.org/data/definitions/310.html]
Description from CVE
In the Bouncy Castle JCE Provider version 1.55 and earlier the ECIES 
implementation allowed the use of ECB mode. This mode is regarded as unsafe and 
support for it has been removed from the provider.
Explanation
BouncyCastle uses an insecure encryption method when encrypting data using the 
elliptic curve key exchange algorithm. The {{engineInit}} method in the 
{{IESCipher}} class and {{configure}} method in the {{EC}} class implement the 
ECB mode for encryption, which may result in information about the clear text 
being leaked into the encrypted cipher text. An attacker with access to the 
encrypted data can exploit this vulnerability by analyzing the encrypted data 
for patterns that reveal information about the clear text.
Detection
The application is vulnerable by using this component and making use of ECB 
mode encryption
Recommendation
We recommend upgrading to a version of this component that is not vulnerable to 
this specific issue.
Categories
Functional
Data
Root Cause
IESCipher.class : [1.49, 1.56)
EC.class : [1.49, 1.56)
Advisories
Project: 
[https://vigilance.fr/vulnerability/Bouncy-Castle-multiple-vu...|https://vigilance.fr/vulnerability/Bouncy-Castle-multiple-vulnerabilities-21455]
Project: [https://github.com/bcgit/bc-java]
Project: [https://www.bouncycastle.org/releasenotes.html]
Project: [https://www.bouncycastle.org/releasenotes.html]
Project: [https://github.com/bcgit/bc-java]
Project: 
[https://vigilance.fr/vulnerability/Bouncy-Castle-multiple-vu...|https://vigilance.fr/vulnerability/Bouncy-Castle-multiple-vulnerabilities-21455]

> Security: Sonatype Nexus scan is reporting multiple vulnearbilities on the 
> bouncy castle version used by Apache Tika
> --------------------------------------------------------------------------------------------------------------------
>
>                 Key: TIKA-2699
>                 URL: https://issues.apache.org/jira/browse/TIKA-2699
>             Project: Tika
>          Issue Type: Bug
>    Affects Versions: 1.17, 1.18
>            Reporter: Abhijit Rajwade
>            Priority: Major
>              Labels: security
>
> Security: Sonatype Nexus scan is reporting multiple vulnearbilities on the 
> bouncy castle version used by Apache Tika.
> Vulnerabilities reported are CVE-2016-1000338, CVE-2016-1000340, 
> CVE-2016-1000342, CVE-2016-1000343, CVE-2016-1000344, CVE-2016-1000352
> The recommendation is to upgrade to non vulnerable Bouncy castle version 1.57 
> or later (1.58, 1.59, 1.60).
> Can you please upgrade Bouncy castle to a non vulnerable version?



--
This message was sent by Atlassian JIRA
(v7.6.3#76005)

Reply via email to