CVE-2015-0226

Source
https://nvd.nist.gov/vuln/detail/CVE-2015-0226
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2015-0226.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2015-0226
Aliases
Related
Published
2017-10-30T14:29:00Z
Modified
2024-09-11T02:00:05Z
Severity
  • 7.5 (High) CVSS_V3 - CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N CVSS Calculator
Summary
[none]
Details

Apache WSS4J before 1.6.17 and 2.0.x before 2.0.2 improperly leaks information about decryption failures when decrypting an encrypted key or message data, which makes it easier for remote attackers to recover the plaintext form of a symmetric key via a series of crafted messages. NOTE: this vulnerability exists because of an incomplete fix for CVE-2011-2487.

References

Affected packages

Debian:11 / wss4j

Package

Name
wss4j
Purl
pkg:deb/debian/wss4j?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.6.15-2

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Debian:12 / wss4j

Package

Name
wss4j
Purl
pkg:deb/debian/wss4j?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.6.15-2

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Debian:13 / wss4j

Package

Name
wss4j
Purl
pkg:deb/debian/wss4j?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.6.15-2

Ecosystem specific

{
    "urgency": "not yet assigned"
}