CVE-2016-9121

go-jose before 1.0.4 suffers from an invalid curve attack for the ECDH-ES algorithm. When deriving a shared key using ECDH-ES for an encrypted message, go-jose neglected to check that the received public key on a message is on the same curve as the static private key of the receiver, thus making it vulnerable to an invalid curve attack.
References
Configurations

Configuration 1 (hide)

cpe:2.3:a:go-jose_project:go-jose:*:*:*:*:*:*:*:*

History

21 Nov 2024, 03:00

Type Values Removed Values Added
References () http://www.openwall.com/lists/oss-security/2016/11/03/1 - Mailing List, Patch, Third Party Advisory () http://www.openwall.com/lists/oss-security/2016/11/03/1 - Mailing List, Patch, Third Party Advisory
References () https://github.com/square/go-jose/commit/c7581939a3656bb65e89d64da0a52364a33d2507 - Issue Tracking, Patch, Third Party Advisory () https://github.com/square/go-jose/commit/c7581939a3656bb65e89d64da0a52364a33d2507 - Issue Tracking, Patch, Third Party Advisory
References () https://hackerone.com/reports/164590 - Permissions Required () https://hackerone.com/reports/164590 - Permissions Required

Information

Published : 2017-03-28 02:59

Updated : 2024-11-21 03:00


NVD link : CVE-2016-9121

Mitre link : CVE-2016-9121

CVE.ORG link : CVE-2016-9121


JSON object : View

Products Affected

go-jose_project

  • go-jose
CWE
CWE-326

Inadequate Encryption Strength