In Nimbus JOSE+JWT before 4.39, there is no integer-overflow check when converting length values from bytes to bits, which allows attackers to conduct HMAC bypass attacks by shifting Additional Authenticated Data (AAD) and ciphertext so that different plaintext is obtained for the same HMAC.
Metrics
Affected Vendors & Products
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2022-2037 | In Nimbus JOSE+JWT before 4.39, there is no integer-overflow check when converting length values from bytes to bits, which allows attackers to conduct HMAC bypass attacks by shifting Additional Authenticated Data (AAD) and ciphertext so that different plaintext is obtained for the same HMAC. |
Github GHSA |
GHSA-2qp9-wg27-9pcv | Nimbus JOSE+JWT missing overflow check |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
No history.
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-05T18:51:07.371Z
Reserved: 2017-08-20T00:00:00
Link: CVE-2017-12972
No data.
Status : Deferred
Published: 2017-08-20T16:29:00.237
Modified: 2025-04-20T01:37:25.860
Link: CVE-2017-12972
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD
Github GHSA