Bug 2255131 (CVE-2023-50980)

Summary: CVE-2023-50980 cryptopp: DoS via malformed DER public key file
Product: [Other] Security Response Reporter: Robb Gatica <rgatica>
Component: vulnerabilityAssignee: Product Security <prodsec-ir-bot>
Status: NEW --- QA Contact:
Severity: medium Docs Contact:
Priority: medium    
Version: unspecifiedKeywords: Security
Target Milestone: ---   
Target Release: ---   
Hardware: All   
OS: Linux   
Whiteboard:
Fixed In Version: Doc Type: ---
Doc Text:
A flaw was discovered in Crypto++ (cryptopp). A remote attacker may craft a malformed public key file which can trigger a segmentation fault, leading to a denial of service.
Story Points: ---
Clone Of: Environment:
Last Closed: Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Bug Depends On: 2255132, 2255133    
Bug Blocks: 2255124    

Description Robb Gatica 2023-12-18 19:51:20 UTC
Reference: https://github.com/weidai11/cryptopp/issues/1248

-----
Hi, recently I found a security issue in the Crypto++ library that would cause a segmentation fault when parsing DER public key files of the F(2^m) class curves, an attacker could potentially craft a malformed DER public key file, and any user or server attempting to read this public key file in processes such as ECDSA may be susceptible to a DOS attack.
Issue

The main reason of this issue is that when parsing the DER public key file of the F(2^m) class curve (EC2N::DecodePoint), there is no check that the degree of each term in the polynomial is strictly decreasing.

Comment 1 Robb Gatica 2023-12-18 19:51:36 UTC
Created cryptopp tracking bugs for this issue:

Affects: epel-all [bug 2255132]
Affects: fedora-all [bug 2255133]