mirror of
https://github.com/0xMarcio/cve.git
synced 2025-05-06 10:41:43 +00:00
27 lines
1.3 KiB
Markdown
27 lines
1.3 KiB
Markdown
![]() |
### [CVE-2015-7940](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7940)
|
||
|

|
||
|

|
||
|

|
||
|
|
||
|
### Description
|
||
|
|
||
|
The Bouncy Castle Java library before 1.51 does not validate a point is withing the elliptic curve, which makes it easier for remote attackers to obtain private keys via a series of crafted elliptic curve Diffie Hellman (ECDH) key exchanges, aka an "invalid curve attack."
|
||
|
|
||
|
### POC
|
||
|
|
||
|
#### Reference
|
||
|
- http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html
|
||
|
- http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html
|
||
|
- http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html
|
||
|
- http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html
|
||
|
- http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
|
||
|
- https://www.oracle.com/security-alerts/cpuapr2020.html
|
||
|
- https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html
|
||
|
|
||
|
#### Github
|
||
|
- https://github.com/ARPSyndicate/cvemon
|
||
|
- https://github.com/IkerSaint/VULNAPP-vulnerable-app
|
||
|
- https://github.com/auditt7708/rhsecapi
|
||
|
- https://github.com/pctF/vulnerable-app
|
||
|
|