Bug 1227239

Summary: VUL-0: CVE-2024-34703: MozillaThunderbird: Botan: denial of service due to overly large elliptic curve parameters
Product: [Novell Products] SUSE Security Incidents Reporter: Camila Camargo de Matos <camila.matos>
Component: IncidentsAssignee: Mozilla Bugs <mozilla-bugs>
Status: NEW --- QA Contact: Security Team bot <security-team>
Severity: Normal    
Priority: P3 - Medium CC: camila.matos, martin.sirringhaus, security-team, smash_bz
Version: unspecified   
Target Milestone: ---   
Hardware: Other   
OS: Other   
URL: https://smash.suse.de/issue/412444/
Whiteboard:
Found By: Security Response Team Services Priority:
Business Priority: Blocker: ---
Marketing QA Status: --- IT Deployment: ---
Bug Depends on:    
Bug Blocks: 1227238    

Description Camila Camargo de Matos 2024-07-01 14:07:32 UTC
+++ This bug was initially created as a clone of Bug #1227238 +++

Botan is a C++ cryptography library. X.509 certificates can identify elliptic curves using either an object identifier or using explicit encoding of the parameters. Prior to versions 3.3.0 and 2.19.4, an attacker could present an ECDSA X.509 certificate using explicit encoding where the parameters are very large. The proof of concept used a 16Kbit prime for this purpose. When parsing, the parameter is checked to be prime, causing excessive computation. This was patched in 2.19.4 and 3.3.0 to allow the prime parameter of the elliptic curve to be at most 521 bits. No known workarounds are available. Note that support for explicit encoding of elliptic curve parameters is deprecated in Botan.

References:
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2024-34703
https://www.cve.org/CVERecord?id=CVE-2024-34703
https://github.com/randombit/botan/commit/08c404b23740babee1f6aa51b54e966029aadee4
https://github.com/randombit/botan/commit/94e9154c143aa5264da6254a6a1be5bc66ee2b5a
https://github.com/randombit/botan/security/advisories/GHSA-w4g2-7m2h-7xj7
https://bugzilla.redhat.com/show_bug.cgi?id=2294868
Comment 2 Martin Sirringhaus 2024-07-02 14:59:16 UTC
The upstream fix applies cleanly to the vendored botan-version. I will prepare submissions.
Comment 4 Maintenance Automation 2024-07-12 12:30:09 UTC
SUSE-SU-2024:2415-1: An update that solves one vulnerability and has one security fix can now be installed.

Category: security (moderate)
Bug References: 1226495, 1227239
CVE References: CVE-2024-34703
Maintenance Incident: [SUSE:Maintenance:34542](https://smelt.suse.de/incident/34542/)
Sources used:
openSUSE Leap 15.5 (src):
 MozillaThunderbird-115.12.2-150200.8.168.1
openSUSE Leap 15.6 (src):
 MozillaThunderbird-115.12.2-150200.8.168.1
SUSE Package Hub 15 15-SP5 (src):
 MozillaThunderbird-115.12.2-150200.8.168.1
SUSE Package Hub 15 15-SP6 (src):
 MozillaThunderbird-115.12.2-150200.8.168.1
SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (src):
 MozillaThunderbird-115.12.2-150200.8.168.1
SUSE Linux Enterprise Workstation Extension 15 SP5 (src):
 MozillaThunderbird-115.12.2-150200.8.168.1
SUSE Linux Enterprise Workstation Extension 15 SP6 (src):
 MozillaThunderbird-115.12.2-150200.8.168.1

NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.