An issue was discovered in Bouncy Castle Java TLS API and JSSE Provider before 1.78. Timing-based leakage may occur in RSA based handshakes because of exception processing.
Metrics
Affected Vendors & Products
References
History
Mon, 19 Aug 2024 19:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Weaknesses | CWE-203 |
Fri, 16 Aug 2024 18:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
CPEs | cpe:/a:redhat:jboss_enterprise_application_platform:8.0 cpe:/a:redhat:jboss_enterprise_application_platform:8.0::el8 cpe:/a:redhat:jboss_enterprise_application_platform:8.0::el9 |
Fri, 09 Aug 2024 02:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Redhat jboss Enterprise Application Platform
|
|
CPEs | cpe:/a:redhat:jboss_enterprise_application_platform:7.4 cpe:/a:redhat:jboss_enterprise_application_platform:7.4::el7 cpe:/a:redhat:jboss_enterprise_application_platform:7.4::el8 cpe:/a:redhat:jboss_enterprise_application_platform:7.4::el9 |
|
Vendors & Products |
Redhat jboss Enterprise Application Platform
|
MITRE
Status: PUBLISHED
Assigner: mitre
Published: 2024-05-09T00:00:00
Updated: 2024-08-19T17:18:20.969Z
Reserved: 2024-03-24T00:00:00
Link: CVE-2024-30171
Vulnrichment
Updated: 2024-08-02T01:25:02.988Z
NVD
Status : Awaiting Analysis
Published: 2024-05-14T15:21:52.690
Modified: 2024-11-21T09:11:21.590
Link: CVE-2024-30171
Redhat