Description
OpenIDC/cjose is a C library implementing the Javascript Object Signing and Encryption (JOSE). The AES GCM decryption routine incorrectly uses the Tag length from the actual Authentication Tag provided in the JWE. The spec says that a fixed length of 16 octets must be applied. Therefore this bug allows an attacker to provide a truncated Authentication Tag and to modify the JWE accordingly. Users should upgrade to a version >= 0.6.2.2. Users unable to upgrade should avoid using AES GCM encryption and replace it with another encryption algorithm (e.g. AES CBC).
Published: 2023-07-14
Score: 8.6 High
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

No analysis available yet.

Remediation

No remediation available yet.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Debian DLA Debian DLA DLA-3515-1 cjose security update
Debian DSA Debian DSA DSA-5472-1 cjose security update
EUVD EUVD EUVD-2023-41362 OpenIDC/cjose is a C library implementing the Javascript Object Signing and Encryption (JOSE). The AES GCM decryption routine incorrectly uses the Tag length from the actual Authentication Tag provided in the JWE. The spec says that a fixed length of 16 octets must be applied. Therefore this bug allows an attacker to provide a truncated Authentication Tag and to modify the JWE accordingly. Users should upgrade to a version >= 0.6.2.2. Users unable to upgrade should avoid using AES GCM encryption and replace it with another encryption algorithm (e.g. AES CBC).
Ubuntu USN Ubuntu USN USN-6307-1 JOSE for C/C++ vulnerability
History

Wed, 30 Oct 2024 16:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Subscriptions

Cisco Cjose
Redhat Enterprise Linux Rhel Aus Rhel E4s Rhel Eus Rhel Tus
cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2025-02-13T17:01:27.231Z

Reserved: 2023-07-06T13:01:36.997Z

Link: CVE-2023-37464

cve-icon Vulnrichment

Updated: 2024-08-02T17:16:30.233Z

cve-icon NVD

Status : Modified

Published: 2023-07-14T21:15:08.903

Modified: 2024-11-21T08:11:45.743

Link: CVE-2023-37464

cve-icon Redhat

Severity : Important

Publid Date: 2023-07-14T00:00:00Z

Links: CVE-2023-37464 - Bugzilla

cve-icon OpenCVE Enrichment

No data.

Weaknesses