Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2024-29857

Опубликовано: 14 июн. 2024
Источник: redhat
CVSS3: 6.5
EPSS Низкий

Описание

An issue was discovered in ECCurve.java and ECCurve.cs in Bouncy Castle Java (BC Java) before 1.78, BC Java LTS before 2.73.6, BC-FJA before 1.0.2.5, and BC C# .Net before 2.3.1. Importing an EC certificate with crafted F2m parameters can lead to excessive CPU consumption during the evaluation of the curve parameters.

A vulnerability was found in Bouncy Castle. An issue was discovered in ECCurve.java and ECCurve.cs in Bouncy Castle Java (BC Java). Importing an EC certificate with crafted F2m parameters can lead to excessive CPU consumption during the evaluation of the curve parameters.

Отчет

Within regulated environments, a combination of the following controls acts as a significant barrier to successfully exploiting a CWE-20: Improper Input Validation vulnerability and therefore downgrades the severity of this particular CVE from Moderate to Low. Red Hat enforces the principle of least functionality, ensuring that only essential features, services, and ports are enabled. This minimizes the number of components that could be affected by input validation vulnerabilities. Security testing and evaluation standards are implemented within the environment to rigorously test input validation mechanisms during the development lifecycle, while static code analysis identifies potential input validation vulnerabilities by default. Process isolation ensures that processes handling potentially malicious or unvalidated inputs run in isolated environments by separating execution domains for each process. Malicious code protections, such as IPS/IDS and antimalware solutions, help detect and mitigate malicious payloads stemming from input validation vulnerabilities. Finally, robust input validation and error-handling mechanisms ensure all user inputs are thoroughly validated, preventing improperly validated inputs from causing system instability, exposing sensitive data, or escalating risks further.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Cryostat 2org.bouncycastle:bcprov-jdk18onNot affected
Red Hat build of Apache Camel for Spring Boot 3org.bouncycastle:bcprov-jdk18onWill not fix
Red Hat Build of Keycloakorg.bouncycastle:bcprov-jdk18onAffected
Red Hat Data Grid 8org.bouncycastle:bcprov-jdk18onNot affected
Red Hat Fuse 7org.bouncycastle:bcprov-jdk18onNot affected
Red Hat JBoss Enterprise Application Platform Expansion Packorg.bouncycastle:bcprov-jdk18onAffected
streams for Apache Kafkaorg.bouncycastle:bcprov-jdk18onWill not fix
Important: Red Hat JBoss Enterprise Application Platform 7.4.18 Security updateorg.bouncycastleFixedRHSA-2024:514708.08.2024
Red Hat AMQ Broker 7org.bouncycastleFixedRHSA-2024:427102.07.2024
Red Hat build of Apache Camel 4.4.1 for Spring Boot 3.2org.bouncycastleFixedRHSA-2024:488425.07.2024

Показывать по

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-20
https://bugzilla.redhat.com/show_bug.cgi?id=2293028org.bouncycastle: Importing an EC certificate with crafted F2m parameters may lead to Denial of Service

EPSS

Процентиль: 56%
0.00337
Низкий

6.5 Medium

CVSS3

Связанные уязвимости

CVSS3: 7.5
ubuntu
больше 1 года назад

An issue was discovered in ECCurve.java and ECCurve.cs in Bouncy Castle Java (BC Java) before 1.78, BC Java LTS before 2.73.6, BC-FJA before 1.0.2.5, and BC C# .Net before 2.3.1. Importing an EC certificate with crafted F2m parameters can lead to excessive CPU consumption during the evaluation of the curve parameters.

CVSS3: 7.5
nvd
больше 1 года назад

An issue was discovered in ECCurve.java and ECCurve.cs in Bouncy Castle Java (BC Java) before 1.78, BC Java LTS before 2.73.6, BC-FJA before 1.0.2.5, and BC C# .Net before 2.3.1. Importing an EC certificate with crafted F2m parameters can lead to excessive CPU consumption during the evaluation of the curve parameters.

CVSS3: 7.5
debian
больше 1 года назад

An issue was discovered in ECCurve.java and ECCurve.cs in Bouncy Castl ...

CVSS3: 5.3
github
больше 1 года назад

Bouncy Castle certificate parsing issues cause high CPU usage during parameter evaluation.

CVSS3: 5.3
fstec
почти 2 года назад

Уязвимость файлов ECCurve.java и ECCurve.cs библиотеки проверки ключа EC модуля Math средств криптографической защиты Bouncy Castle Crypto Package For Java (BC Java), Bouncy Castle Java Long Term Stable (LTS) (BC-LJA), Bouncy Castle FIPS Java API (BC-FJA) и Bouncy Castle Cryptography Library For .NET, позволяющая нарушителю вызвать отказ в обслуживании

EPSS

Процентиль: 56%
0.00337
Низкий

6.5 Medium

CVSS3