The RSA 1.5 algorithm implementation in the JOSE_JWE class in JWE.php in jose-php before 2.2.1 lacks the Random Filling protection mechanism, which makes it easier for remote attackers to obtain cleartext data via a Million Message Attack (MMA).
References
Link | Resource |
---|---|
http://www.securityfocus.com/bid/92741 | Third Party Advisory VDB Entry |
https://github.com/nov/jose-php/commit/f03b986b4439e20b0fd635109b48afe96cf0099b#diff-37b0d289d6375ba4a7740401950ccdd6R199 | Patch |
http://www.securityfocus.com/bid/92741 | Third Party Advisory VDB Entry |
https://github.com/nov/jose-php/commit/f03b986b4439e20b0fd635109b48afe96cf0099b#diff-37b0d289d6375ba4a7740401950ccdd6R199 | Patch |
Configurations
History
21 Nov 2024, 02:54
Type | Values Removed | Values Added |
---|---|---|
References | () http://www.securityfocus.com/bid/92741 - Third Party Advisory, VDB Entry | |
References | () https://github.com/nov/jose-php/commit/f03b986b4439e20b0fd635109b48afe96cf0099b#diff-37b0d289d6375ba4a7740401950ccdd6R199 - Patch |
Information
Published : 2016-09-03 20:59
Updated : 2024-11-21 02:54
NVD link : CVE-2016-5430
Mitre link : CVE-2016-5430
CVE.ORG link : CVE-2016-5430
JSON object : View
Products Affected
jose-php_project
- jose-php