CVE-2023-37464

OpenIDC/cjose is a C library implementing the Javascript Object Signing and Encryption (JOSE). The AES GCM decryption routine incorrectly uses the Tag length from the actual Authentication Tag provided in the JWE. The spec  says that a fixed length of 16 octets must be applied. Therefore this bug allows an attacker to provide a truncated Authentication Tag and to modify the JWE accordingly. Users should upgrade to a version >= 0.6.2.2. Users unable to upgrade should avoid using AES GCM encryption and replace it with another encryption algorithm (e.g. AES CBC).
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTNIST
8.6 HIGH
NETWORK
LOW
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:H/A:N
GitHub_MCNA
8.6 HIGH
NETWORK
LOW
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:H/A:N
CVEADP
---
---
CISA-ADPADP
---
---
Base Score
CVSS 3.x
EPSS Score
Percentile: 53%
VendorProductVersion
ciscocjose
𝑥
< 0.6.2.2
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
cjose
bullseye (security)
0.6.1+dfsg1-1+deb11u1
fixed
bullseye
0.6.1+dfsg1-1+deb11u1
fixed
bookworm
0.6.2.1-1+deb12u1
fixed
bookworm (security)
0.6.2.1-1+deb12u1
fixed
sid
0.6.2.3-1
fixed
trixie
0.6.2.3-1
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
cjose
oracular
needs-triage
noble
needs-triage
mantic
ignored
lunar
Fixed 0.6.2.1-1ubuntu0.1
released
kinetic
ignored
jammy
Fixed 0.6.1+dfsg1-3ubuntu1.1
released
focal
Fixed 0.6.1+dfsg1-1ubuntu0.1
released
bionic
Fixed 0.6.0+dfsg1-1ubuntu0.1~esm1
released
xenial
ignored
trusty
ignored
References