First published: Wed Sep 04 2024(Updated: )
In Connect2id Nimbus JOSE+JWT before 9.37.2, an attacker can cause a denial of service (resource consumption) via a large JWE p2c header value (aka iteration count) for the PasswordBasedDecrypter (PBKDF2) component.
Affected Software | Affected Version | How to fix |
---|---|---|
Connect2id Nimbus JOSE+JWT | <9.37.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-2309764 is classified as a denial of service vulnerability.
To fix REDHAT-BUG-2309764, update to a version of Connect2id Nimbus JOSE+JWT that is 9.37.2 or later.
The PasswordBasedDecrypter (PBKDF2) component is affected by REDHAT-BUG-2309764.
An attacker can perform a denial of service attack through resource consumption with a large JWE p2c header value.
Versions of Connect2id Nimbus JOSE+JWT prior to 9.37.2 are vulnerable according to REDHAT-BUG-2309764.