Bouncy Castle Java Cryptography API vulnerable to DNS poisoning
Moderate severity
GitHub Reviewed
Published
May 3, 2024
to the GitHub Advisory Database
•
Updated Jun 24, 2025
Package
Affected versions
>= 1.61, < 1.78
Patched versions
1.78
Description
Published by the National Vulnerability Database
May 3, 2024
Published to the GitHub Advisory Database
May 3, 2024
Reviewed
May 3, 2024
Last updated
Jun 24, 2025
An issue was discovered in the Bouncy Castle Crypto Package For Java before BC TLS Java 1.0.19 (ships with BC Java 1.78, BC Java (LTS) 2.73.6) and before BC FIPS TLS Java 1.0.19. When endpoint identification is enabled in the BCJSSE and an SSL socket is created without an explicit hostname (as happens with HttpsURLConnection), hostname verification could be performed against a DNS-resolved IP address in some situations, opening up a possibility of DNS poisoning.
References