An issue was discovered in Bouncy Castle Java Cryptography APIs before BC 1.78. When endpoint identification is enabled in the BCJSSE and an SSL socket is created without an explicit hostname (as happens with HttpsURLConnection), hostname verification could be performed against a DNS-resolved IP address in some situations, opening up a possibility of DNS poisoning.
Metrics
Affected Vendors & Products
References
History
No history.
MITRE
Status: PUBLISHED
Assigner: mitre
Published: 2024-05-03T00:00:00
Updated: 2024-08-02T02:51:11.426Z
Reserved: 2024-05-03T00:00:00
Link: CVE-2024-34447
Vulnrichment
Updated: 2024-08-02T02:51:11.426Z
NVD
Status : Awaiting Analysis
Published: 2024-05-03T16:15:11.460
Modified: 2024-11-21T09:18:41.543
Link: CVE-2024-34447
Redhat