CVE-2015-0226 (retired)

Apache WSS4J before 1.6.17 and 2.0.x before 2.0.2 improperly leaks
information about decryption failures when decrypting an encrypted key or
message data, which makes it easier for remote attackers to recover the
plaintext form of a symmetric key via a series of crafted messages. NOTE:
this vulnerability exists because of an incomplete fix for CVE-2011-2487.
 mdeslaur> code isn't present in 1.5.x
Source: wss4j (LP Ubuntu Debian)
Upstream:released (1.6.15-2)
Ubuntu 12.04 ESM (Precise Pangolin):DNE (precise was not-affected [1.5.8+svntag-1ubuntu1])
Trusty/esm:DNE (trusty was needed)
Ubuntu 16.04 LTS (Xenial Xerus):not-affected (1.6.15-2)
Ubuntu 18.04 LTS (Bionic Beaver):not-affected (1.6.15-2)
Ubuntu 18.10 (Cosmic Cuttlefish):not-affected (1.6.15-2)
Ubuntu 19.04 (Disco Dingo):not-affected (1.6.15-2)
Ubuntu 19.10 (Eoan):not-affected (1.6.15-2)
More Information

Updated: 2019-04-26 14:34:10 UTC (commit 30899e40836d26e1bb5f0b072d31fd87b6cf3bd4)