OpenIDC/cjose is a C library implementing the Javascript Object Signing and Encryption (JOSE). The AES GCM decryption routine incorrectly uses the Tag length from the actual Authentication Tag provided in the JWE. The spec says that a fixed length of 16 octets must be applied. Therefore this bug allows an attacker to provide a truncated Authentication Tag and to modify the JWE accordingly. Users should upgrade to a version >= 0.6.2.2. Users unable to upgrade should avoid using AES GCM encryption and replace it with another encryption algorithm (e.g. AES CBC).
References
Configurations
History
21 Nov 2024, 08:11
Type | Values Removed | Values Added |
---|---|---|
References | () https://datatracker.ietf.org/doc/html/rfc7518#section-4.7 - Third Party Advisory | |
References | () https://github.com/OpenIDC/cjose/commit/7325e9a5e71e2fc0e350487ecac7d84acdf0ed5e - Patch | |
References | () https://github.com/OpenIDC/cjose/releases/tag/v0.6.2.2 - Release Notes | |
References | () https://github.com/OpenIDC/cjose/security/advisories/GHSA-3rhg-3gf2-6xgj - Exploit, Patch, Vendor Advisory | |
References | () https://lists.debian.org/debian-lts-announce/2023/08/msg00002.html - | |
References | () https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DFWAPMYYVBO2U65HPYDTBEKNSXG4TP5C/ - | |
References | () https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LCQJXKDPCWCXB2V4JMQ3UWYJ4UIBPUW6/ - | |
References | () https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PTZHOVGY7AHGNMEY245HK4Q36AMA53AL/ - | |
References | () https://www.debian.org/security/2023/dsa-5472 - | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 8.6 |
15 Sep 2023, 22:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
10 Sep 2023, 03:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
09 Aug 2023, 20:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
04 Aug 2023, 13:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
31 Jul 2023, 17:15
Type | Values Removed | Values Added |
---|---|---|
References | (MISC) https://github.com/OpenIDC/cjose/security/advisories/GHSA-3rhg-3gf2-6xgj - Exploit, Patch, Vendor Advisory | |
References | (MISC) https://github.com/OpenIDC/cjose/commit/7325e9a5e71e2fc0e350487ecac7d84acdf0ed5e - Patch | |
References | (MISC) https://github.com/OpenIDC/cjose/releases/tag/v0.6.2.2 - Release Notes | |
References | (MISC) https://datatracker.ietf.org/doc/html/rfc7518#section-4.7 - Third Party Advisory | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.5 |
CPE | cpe:2.3:a:cisco:cjose:*:*:*:*:*:*:*:* | |
First Time |
Cisco
Cisco cjose |
14 Jul 2023, 21:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2023-07-14 21:15
Updated : 2024-11-21 08:11
NVD link : CVE-2023-37464
Mitre link : CVE-2023-37464
CVE.ORG link : CVE-2023-37464
JSON object : View
Products Affected
cisco
- cjose
CWE
CWE-327
Use of a Broken or Risky Cryptographic Algorithm