Spectra Assure
Community
failRisk: Tampering
Scanned: 8 days ago

bouncy-castle-java

latest
Top 10k
Gem redistribution of Bouncy Castle jars
License: unknown
Published: almost 13 years ago



SAFE Assessment

Compliance

Licenses
No license compliance issues
Secrets
No sensitive information found

Security

Vulnerabilities
8 high severity vulnerabilities
Hardening
No application hardening issues

Threats

Tampering
2 signature compliance mistakes
Malware
No evidence of malware inclusion

Popularity

1.61M
Total Downloads
Contributor
Declared Dependencies
5
Dependents

Top issues

Problem

Digital signatures are applied to applications, packages and documents as a cryptographically secured authenticity record. Signatures are made using digital certificates, which can either be purchased from certificate authorities or be self-issued. Certificates consist of various object fields, some of which describe the allowed certificate uses. Digital certificates can only be used for code signing if that property is found in its list of extended key usage policies. It is possible to mistakenly use an SSL certificate as a code signing certificate during software publishing.

Prevalence in RubyGems community

0 packages
found in
Top 100
0 packages
found in
Top 1k
12 packages
found in
Top 10k
196 packages
in community

Next steps

Review the certificate information passed to the code signing application.
If the problem persists, re-sign the software component with a newly acquired certificate, then publish the software package again.

Problem

Digital signatures are applied to applications, packages and documents as a cryptographically secured authenticity record. Signatures are made using digital certificates, which can either be purchased from certificate authorities or be self-issued. Certificates have a validity period during which they can be used to create signatures. For application signatures, or digital code signing, it is recommended to countersign the signatures for time-stamping. Countersigned software components have their signature period validity extended past the signing certificate expiration date. Such signatures are considered valid indefinitely. We detected that the digital signature was not countersigned for time-stamping, and that the signing certificate has expired. Failing to countersign software components may result in application errors and availability outages.

Prevalence in RubyGems community

2 packages
found in
Top 100
2 packages
found in
Top 1k
18 packages
found in
Top 10k
261 packages
in community

Next steps

Acquire a new certificate and re-sign the software component.
Apply the optional time-stamping countersignature during signing.
With Microsoft SignTool, you can specify the trusted remote time-stamping server using the /t or /tr parameter.

Problem

Digital signatures are applied to applications, packages and documents as a cryptographically secured authenticity record. Signatures are made using digital certificates, which can either be purchased from certificate authorities or be self-issued. When purchased from a certificate authority, a certificate must conform to industry standards and best practices. One such requirement is that a certificate authority must be able revoke a certificate if its misuse was reported and independently confirmed. Software users rely on the certificate revocation process to defend from malicious actors that might be controlling a certificate issued to a trusted publisher. Operating systems periodically refresh local copies of certificate revocation lists. If the signature does not include a hyperlink to the certificate revocation server, its status cannot be checked. While a commercial certificate authority is unlikely to omit this information, some policy deviations can occur in practice.

Prevalence in RubyGems community

0 packages
found in
Top 100
0 packages
found in
Top 1k
16 packages
found in
Top 10k
191 packages
in community

Next steps

Communicate the detected issue to your certificate issuer, and have a new certificate created to resolve it.
Use your newly issued certificate to re-sign the software component.

Problem

Software composition analysis has identified a component with one or more known vulnerabilities. Based on the CVSS scoring, these vulnerabilities have been marked as high severity.

Prevalence in RubyGems community

36 packages
found in
Top 100
157 packages
found in
Top 1k
1717 packages
found in
Top 10k
29.81k packages
in community

Next steps

Perform impact analysis for the reported CVEs.
Update the component to the latest version.
If the update can't resolve the issue, create a plan to isolate or replace the affected component.

Problem

Digital signatures are applied to applications, packages and documents as a cryptographically secured authenticity record. Signatures verify the origin and the integrity of the object they apply to. For application signatures, or digital code signing, it is recommended to countersign the signatures for time-stamping. Countersigned software components have their signature period validity extended past the signing certificate expiration date. Such signatures are considered valid indefinitely. Failing to countersign software components may result in application errors and availability outages.

Prevalence in RubyGems community

2 packages
found in
Top 100
3 packages
found in
Top 1k
20 packages
found in
Top 10k
303 packages
in community

Next steps

Consult the certificate authority code signing documentation.
With Microsoft SignTool, you can specify the trusted remote time-stamping server using the /t or /tr parameter.

Top behaviors

Prevalence in RubyGems community

Behavior often found in this community (Common)
68 packages
found in
Top 100
564 packages
found in
Top 1k
3722 packages
found in
Top 10k
59.26k packages
in community

Prevalence in RubyGems community

Behavior often found in this community (Common)
9 packages
found in
Top 100
59 packages
found in
Top 1k
417 packages
found in
Top 10k
5.78k packages
in community

Prevalence in RubyGems community

Behavior often found in this community (Common)
17 packages
found in
Top 100
58 packages
found in
Top 1k
745 packages
found in
Top 10k
9.85k packages
in community

Prevalence in RubyGems community

Behavior often found in this community (Common)
60 packages
found in
Top 100
570 packages
found in
Top 1k
6510 packages
found in
Top 10k
173.74k packages
in community

Prevalence in RubyGems community

Behavior often found in this community (Common)
17 packages
found in
Top 100
77 packages
found in
Top 1k
439 packages
found in
Top 10k
19.07k packages
in community

Top vulnerabilities

Vulnerability Exploitation Lifecycle
(19 Active Vulnerabilities)
18 (18 Fixable)
CVE-2016-1000338h
CVE-2016-1000342h
CVE-2016-1000343h
1 (0 Fixable)
CVE-2023-33202m
None
None
Exploits Unknown
Exploits Exist
Exploited by Malware
Patching Mandated