mirror of
https://github.com/0xMarcio/cve.git
synced 2025-11-30 18:56:19 +00:00
27 lines
1.3 KiB
Markdown
27 lines
1.3 KiB
Markdown
### [CVE-2015-7940](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7940)
|
|

|
|

|
|

|
|
|
|
### Description
|
|
|
|
The Bouncy Castle Java library before 1.51 does not validate a point is withing the elliptic curve, which makes it easier for remote attackers to obtain private keys via a series of crafted elliptic curve Diffie Hellman (ECDH) key exchanges, aka an "invalid curve attack."
|
|
|
|
### POC
|
|
|
|
#### Reference
|
|
- http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html
|
|
- http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html
|
|
- http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html
|
|
- http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html
|
|
- http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
|
|
- https://www.oracle.com/security-alerts/cpuapr2020.html
|
|
- https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html
|
|
|
|
#### Github
|
|
- https://github.com/ARPSyndicate/cvemon
|
|
- https://github.com/IkerSaint/VULNAPP-vulnerable-app
|
|
- https://github.com/auditt7708/rhsecapi
|
|
- https://github.com/pctF/vulnerable-app
|
|
|