{"id":"CVE-2016-1000338","details":"In Bouncy Castle JCE Provider version 1.55 and earlier the DSA does not fully validate ASN.1 encoding of signature on verification. It is possible to inject extra elements in the sequence making up the signature and still have it validate, which in some cases may allow the introduction of 'invisible' data into a signed structure.","aliases":["GHSA-4vhj-98r6-424h"],"modified":"2026-04-10T04:57:23.269794Z","published":"2018-06-01T20:29:00.217Z","related":["MGASA-2018-0376","openSUSE-SU-2024:10661-1"],"references":[{"type":"ADVISORY","url":"https://usn.ubuntu.com/3727-1/"},{"type":"ADVISORY","url":"https://www.oracle.com/security-alerts/cpuoct2020.html"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2018:2669"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2018:2927"},{"type":"ADVISORY","url":"https://lists.apache.org/thread.html/708d94141126eac03011144a971a6411fcac16d9c248d1d535a39451%40%3Csolr-user.lucene.apache.org%3E"},{"type":"ADVISORY","url":"https://lists.debian.org/debian-lts-announce/2018/07/msg00009.html"},{"type":"ADVISORY","url":"https://security.netapp.com/advisory/ntap-20231006-0011/"},{"type":"FIX","url":"https://github.com/bcgit/bc-java/commit/b0c3ce99d43d73a096268831d0d120ffc89eac7f#diff-3679f5a9d2b939d0d3ee1601a7774fb0"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/bcgit/bc-java","events":[{"introduced":"0"},{"fixed":"996763c72e128cd677fcd97d3fa74beb2c12124b"},{"fixed":"b0c3ce99d43d73a096268831d0d120ffc89eac7f"}],"database_specific":{"versions":[{"introduced":"1.38"},{"fixed":"1.56"}]}}],"versions":["r1rv49","r1rv50","r1rv51","r1rv52","r1rv53","r1rv54","r1rv55"],"database_specific":{"unresolved_ranges":[{"events":[{"introduced":"0"},{"last_affected":"6.4-NA"}]},{"events":[{"introduced":"0"},{"last_affected":"6.4"}]},{"events":[{"introduced":"0"},{"last_affected":"14.04"}]}],"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2016-1000338.json","vanir_signatures_modified":"2026-04-10T04:57:23Z","vanir_signatures":[{"signature_version":"v1","deprecated":false,"digest":{"function_hash":"260934301005839087771033825261480613861","length":2322},"source":"https://github.com/bcgit/bc-java/commit/b0c3ce99d43d73a096268831d0d120ffc89eac7f","id":"CVE-2016-1000338-087c7fa8","signature_type":"Function","target":{"file":"prov/src/test/java/org/bouncycastle/jce/provider/test/DSATest.java","function":"performTest"}},{"signature_version":"v1","deprecated":false,"digest":{"line_hashes":["136163138208565596251691075970191609612","107562756255838380340501290306204437774","256405273294590351025306411110688622024","321391742634389090900092687248037489853","6668448620659695156447218389951777055","114414081459311079942728053419609401083","224667266301163910456003187272837519895","332764780958810242807759347728695018005","2754744943816587054499795256365031272","54339207175021658509884097720332228201","260804928531546614162744774821933798241","78059865186365016316398972156821482959","197034695221731228794406326079488881854"],"threshold":0.9},"source":"https://github.com/bcgit/bc-java/commit/b0c3ce99d43d73a096268831d0d120ffc89eac7f","id":"CVE-2016-1000338-7c04278f","signature_type":"Line","target":{"file":"prov/src/main/java/org/bouncycastle/jcajce/provider/asymmetric/dsa/DSASigner.java"}},{"signature_version":"v1","deprecated":false,"digest":{"function_hash":"62843566931630879095861907111734894785","length":237},"source":"https://github.com/bcgit/bc-java/commit/b0c3ce99d43d73a096268831d0d120ffc89eac7f","id":"CVE-2016-1000338-9c489c5a","signature_type":"Function","target":{"file":"prov/src/main/java/org/bouncycastle/jcajce/provider/asymmetric/dsa/DSASigner.java","function":"derDecode"}},{"signature_version":"v1","deprecated":false,"digest":{"line_hashes":["27619101407773283894022340957986395790","53925406762360604861398560861262849999","216990679076247254168542336595971957581","14297879978164554187003311429379829455","11867573160650489211141619707597149843","207007376803811096500197258371319649111","312819499243767890488137211355596467932"],"threshold":0.9},"source":"https://github.com/bcgit/bc-java/commit/b0c3ce99d43d73a096268831d0d120ffc89eac7f","id":"CVE-2016-1000338-d475fda9","signature_type":"Line","target":{"file":"prov/src/test/java/org/bouncycastle/jce/provider/test/DSATest.java"}}]}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N"}]}