Bug 2266921 (CVE-2023-51775)

Summary: CVE-2023-51775 jose4j: denial of service via specially crafted JWE
Product: [Other] Security Response Reporter: Rohit Keshri <rkeshri>
Component: vulnerabilityAssignee: Product Security <prodsec-ir-bot>
Status: NEW --- QA Contact:
Severity: medium Docs Contact:
Priority: medium    
Version: unspecifiedCC: aileenc, anstephe, apjagtap, asatyam, asoldano, avibelli, bbaranow, bgeorges, bmaxwell, boliveir, brian.stansberry, ccranfor, cdewolf, chazlett, chfoley, clement.escoffier, cmiranda, dandread, darran.lofthouse, dhanak, diagrawa, dkreling, dosoudil, dpalmer, drichtar, dsimansk, ecerquei, eric.wittmann, fjuma, fmariani, gmalinko, gsmet, ibek, ivassile, iweiss, janstey, jcechace, jmartisk, jpechane, jpoth, jrokos, jscholz, kingland, kverlaen, lgao, lhein, lthon, matzew, max.andersen, mnovotny, mosmerov, msochure, mstefank, msvehla, mulliken, nwallace, olubyans, pantinor, parichar, pcongius, pdelbell, pdrozd, peholase, pgallagh, pierdipi, pjindal, pmackay, porcelli, probinso, pskopek, rguimara, rhuss, rowaters, rruss, rstancel, rsvoboda, sabiswas, sausingh, sbiarozk, sdouglas, skontopo, smaestri, sthorger, swoodman, tasato, tcunning, tom.jenkinson, tqvarnst, yfang
Target Milestone: ---Keywords: Security
Target Release: ---   
Hardware: All   
OS: Linux   
Whiteboard:
Fixed In Version: jose4j 0.9.4 Doc Type: If docs needed, set a value
Doc Text:
A flaw was found in the jose.4.j (jose4j) library. The JWE key management algorithms based on PBKDF2 require a JOSE Header Parameter called p2c (PBES2 Count). This parameter dictates the number of PBKDF2 iterations needed to derive a CEK wrapping key. Its primary purpose is to intentionally slow down the key derivation function, making password brute-force and dictionary attacks more resource-intensive. However, if an attacker sets the p2c parameter in JWE to a large number, it can cause high computational consumption, resulting in a denial of service.
Story Points: ---
Clone Of: Environment:
Last Closed: Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Bug Depends On:    
Bug Blocks: 2266927    

Description Rohit Keshri 2024-02-29 08:52:25 UTC
The jose4j component before 0.9.4 for Java allows attackers to cause a denial of service (CPU consumption) via a large p2c (aka PBES2 Count) value.

https://bitbucket.org/b_c/jose4j/issues/212