First published: Thu Nov 23 2023(Updated: )
Bouncy Castle for Java before 1.73 contains a potential Denial of Service (DoS) issue within the Bouncy Castle org.bouncycastle.openssl.PEMParser class. This class parses OpenSSL PEM encoded streams containing X.509 certificates, PKCS8 encoded keys, and PKCS7 objects. Parsing a file that has crafted ASN.1 data through the PEMParser causes an OutOfMemoryError, which can enable a denial of service attack.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Bouncycastle Bouncy Castle For Java | <1.73 | |
maven/org.bouncycastle:bcprov-jdk15on | <1.70 | |
maven/org.bouncycastle:bcprov-jdk16 | <1.73 | 1.73 |
maven/org.bouncycastle:bcprov-jdk15to18 | <1.73 | 1.73 |
maven/org.bouncycastle:bcprov-jdk14 | <1.73 | 1.73 |
maven/org.bouncycastle:bcprov-ext-jdk16 | <1.73 | 1.73 |
maven/org.bouncycastle:bcprov-ext-jdk15on | <1.73 | 1.73 |
maven/org.bouncycastle:bcpkix-jdk18on | <1.73 | 1.73 |
maven/org.bouncycastle:bcprov-jdk18on | <1.73 | 1.73 |
redhat/bc-java | <1.7.3 | 1.7.3 |
Bouncycastle Fips Java Api | <1.0.2.4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this issue is CVE-2023-33202.
The severity of CVE-2023-33202 is high with a CVSS score of 7.5.
The affected software is Bouncy Castle for Java before version 1.73.
This vulnerability can lead to a Denial of Service (DoS) attack by parsing a crafted file.
To fix CVE-2023-33202, update Bouncy Castle for Java to version 1.73 or later.