Improper verification of cryptographic signature in Bouncy Castle

Published: 2018-06-01 | Updated: 2018-07-05
Risk Low
Patch available YES
Number of vulnerabilities 1
CVE-ID CVE-2016-1000338
Exploitation vector Local network
Public exploit N/A
Vulnerable software
The Bouncy Castle Crypto Package For Java
Universal components / Libraries / Libraries used by multiple products

Vendor Legion of the Bouncy Castle Inc.

Security Bulletin

This security bulletin contains one low risk vulnerability.

1) Improper verification of cryptographic signature

EUVDB-ID: #VU13586

Risk: Low


CVE-ID: CVE-2016-1000338


Exploit availability:


The vulnerability allows a remote attacker to bypass signature validation process.

The JCE Provider in Bouncy Castle does not fully validate ASN.1 encoding of signature on verification within DSA implementation. A remote attacker can inject extra elements in the sequence making up the signature, which will be considered valid allowing an attacker to add extra data into a signed structure.


Install updates from vendor's website.

Vulnerable software versions

The Bouncy Castle Crypto Package For Java: 1.41 - 1.55

Fixed software versions

CPE2.3 External links

Q & A

Can this vulnerability be exploited remotely?

Is there known malware, which exploits this vulnerability?