logo

CVE-2024-29857 bouncycastle.cryptography

Package

Manager: nuget
Name: bouncycastle.cryptography
Vulnerable Version: >=0 <2.3.1

Severity

Level: Medium

CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L

CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N

EPSS: 0.00203 pctl0.42645

Details

Bouncy Castle certificate parsing issues cause high CPU usage during parameter evaluation. An issue was discovered in ECCurve.java and ECCurve.cs in Bouncy Castle Java (BC Java) before 1.78, BC Java LTS before 2.73.6, BC-FJA before 1.0.2.5, and BC C# .Net before 2.3.1. Importing an EC certificate with crafted F2m parameters can lead to excessive CPU consumption during the evaluation of the curve parameters.

Metadata

Created: 2024-05-14T15:32:54Z
Modified: 2024-12-06T15:31:20Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2024/05/GHSA-8xfc-gm6g-vgpv/GHSA-8xfc-gm6g-vgpv.json
CWE IDs: ["CWE-125", "CWE-400"]
Alternative ID: GHSA-8xfc-gm6g-vgpv
Finding: F067
Auto approve: 1