erlang-jose (aka JOSE for Erlang and Elixir) through 1.11.6 allow attackers to cause a denial of service (CPU consumption) via a large p2c (aka PBES2 Count) value in a JOSE header.
Metrics
Affected Vendors & Products
Advisories
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-9mg4-v392-8j68 | erlang-jose vulnerable to denial of service via large p2c value |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Wed, 28 May 2025 17:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
Thu, 22 May 2025 02:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-02T22:23:44.054Z
Reserved: 2023-12-17T00:00:00
Link: CVE-2023-50966
Updated: 2024-08-02T22:23:44.054Z
Status : Awaiting Analysis
Published: 2024-03-19T15:15:07.113
Modified: 2024-11-21T08:37:37.547
Link: CVE-2023-50966
OpenCVE Enrichment
No data.
Weaknesses
Github GHSA