Security
Headlines
HeadlinesLatestCVEs

Headline

GHSA-2c7c-3mj9-8fqh: Decryption of malicious PBES2 JWE objects can consume unbounded system resources

The go-jose package is subject to a “billion hashes attack” causing denial-of-service when decrypting JWE inputs. This occurs when an attacker can provide a PBES2 encrypted JWE blob with a very large p2c value that, when decrypted, produces a denial-of-service.

ghsa
#dos#git
  1. GitHub Advisory Database
  2. GitHub Reviewed
  3. GHSA-2c7c-3mj9-8fqh

Decryption of malicious PBES2 JWE objects can consume unbounded system resources

Moderate severity GitHub Reviewed Published Nov 21, 2023 to the GitHub Advisory Database • Updated Nov 21, 2023

Package

gomod github.com/go-jose/go-jose/v3 (Go)

Affected versions

< 3.0.1

gomod github.com/square/go-jose (Go)

The go-jose package is subject to a “billion hashes attack” causing denial-of-service when decrypting JWE inputs. This occurs when an attacker can provide a PBES2 encrypted JWE blob with a very large p2c value that, when decrypted, produces a denial-of-service.

References

  • go-jose/go-jose#64
  • go-jose/go-jose@65351c2

Published to the GitHub Advisory Database

Nov 21, 2023

Last updated

Nov 21, 2023

ghsa: Latest News

GHSA-x7m9-mv49-fv73: Vaultwarden vulnerable to user impersonation