Логотип exploitDog
bind:CVE-2023-37464
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2023-37464

Количество 8

Количество 8

ubuntu логотип

CVE-2023-37464

около 2 лет назад

OpenIDC/cjose is a C library implementing the Javascript Object Signing and Encryption (JOSE). The AES GCM decryption routine incorrectly uses the Tag length from the actual Authentication Tag provided in the JWE. The spec says that a fixed length of 16 octets must be applied. Therefore this bug allows an attacker to provide a truncated Authentication Tag and to modify the JWE accordingly. Users should upgrade to a version >= 0.6.2.2. Users unable to upgrade should avoid using AES GCM encryption and replace it with another encryption algorithm (e.g. AES CBC).

CVSS3: 8.6
EPSS: Низкий
redhat логотип

CVE-2023-37464

около 2 лет назад

OpenIDC/cjose is a C library implementing the Javascript Object Signing and Encryption (JOSE). The AES GCM decryption routine incorrectly uses the Tag length from the actual Authentication Tag provided in the JWE. The spec says that a fixed length of 16 octets must be applied. Therefore this bug allows an attacker to provide a truncated Authentication Tag and to modify the JWE accordingly. Users should upgrade to a version >= 0.6.2.2. Users unable to upgrade should avoid using AES GCM encryption and replace it with another encryption algorithm (e.g. AES CBC).

CVSS3: 7.5
EPSS: Низкий
nvd логотип

CVE-2023-37464

около 2 лет назад

OpenIDC/cjose is a C library implementing the Javascript Object Signing and Encryption (JOSE). The AES GCM decryption routine incorrectly uses the Tag length from the actual Authentication Tag provided in the JWE. The spec says that a fixed length of 16 octets must be applied. Therefore this bug allows an attacker to provide a truncated Authentication Tag and to modify the JWE accordingly. Users should upgrade to a version >= 0.6.2.2. Users unable to upgrade should avoid using AES GCM encryption and replace it with another encryption algorithm (e.g. AES CBC).

CVSS3: 8.6
EPSS: Низкий
debian логотип

CVE-2023-37464

около 2 лет назад

OpenIDC/cjose is a C library implementing the Javascript Object Signin ...

CVSS3: 8.6
EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2023:3230-1

около 2 лет назад

Security update for cjose

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2023:3030-1

около 2 лет назад

Security update for cjose

EPSS: Низкий
oracle-oval логотип

ELSA-2023-4418

около 2 лет назад

ELSA-2023-4418: mod_auth_openidc:2.3 security update (IMPORTANT)

EPSS: Низкий
oracle-oval логотип

ELSA-2023-4411

около 2 лет назад

ELSA-2023-4411: cjose security update (IMPORTANT)

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
ubuntu логотип
CVE-2023-37464

OpenIDC/cjose is a C library implementing the Javascript Object Signing and Encryption (JOSE). The AES GCM decryption routine incorrectly uses the Tag length from the actual Authentication Tag provided in the JWE. The spec says that a fixed length of 16 octets must be applied. Therefore this bug allows an attacker to provide a truncated Authentication Tag and to modify the JWE accordingly. Users should upgrade to a version >= 0.6.2.2. Users unable to upgrade should avoid using AES GCM encryption and replace it with another encryption algorithm (e.g. AES CBC).

CVSS3: 8.6
0%
Низкий
около 2 лет назад
redhat логотип
CVE-2023-37464

OpenIDC/cjose is a C library implementing the Javascript Object Signing and Encryption (JOSE). The AES GCM decryption routine incorrectly uses the Tag length from the actual Authentication Tag provided in the JWE. The spec says that a fixed length of 16 octets must be applied. Therefore this bug allows an attacker to provide a truncated Authentication Tag and to modify the JWE accordingly. Users should upgrade to a version >= 0.6.2.2. Users unable to upgrade should avoid using AES GCM encryption and replace it with another encryption algorithm (e.g. AES CBC).

CVSS3: 7.5
0%
Низкий
около 2 лет назад
nvd логотип
CVE-2023-37464

OpenIDC/cjose is a C library implementing the Javascript Object Signing and Encryption (JOSE). The AES GCM decryption routine incorrectly uses the Tag length from the actual Authentication Tag provided in the JWE. The spec says that a fixed length of 16 octets must be applied. Therefore this bug allows an attacker to provide a truncated Authentication Tag and to modify the JWE accordingly. Users should upgrade to a version >= 0.6.2.2. Users unable to upgrade should avoid using AES GCM encryption and replace it with another encryption algorithm (e.g. AES CBC).

CVSS3: 8.6
0%
Низкий
около 2 лет назад
debian логотип
CVE-2023-37464

OpenIDC/cjose is a C library implementing the Javascript Object Signin ...

CVSS3: 8.6
0%
Низкий
около 2 лет назад
suse-cvrf логотип
SUSE-SU-2023:3230-1

Security update for cjose

0%
Низкий
около 2 лет назад
suse-cvrf логотип
SUSE-SU-2023:3030-1

Security update for cjose

0%
Низкий
около 2 лет назад
oracle-oval логотип
ELSA-2023-4418

ELSA-2023-4418: mod_auth_openidc:2.3 security update (IMPORTANT)

около 2 лет назад
oracle-oval логотип
ELSA-2023-4411

ELSA-2023-4411: cjose security update (IMPORTANT)

около 2 лет назад

Уязвимостей на страницу