Bug 1217482 (CVE-2023-33202) - VUL-0: CVE-2023-33202: bouncycastle: Out of memory while parsing ASN.1 crafted data in org.bouncycastle.openssl.PEMParser class
Summary: VUL-0: CVE-2023-33202: bouncycastle: Out of memory while parsing ASN.1 crafte...
Status: RESOLVED FIXED
Alias: CVE-2023-33202
Product: SUSE Security Incidents
Classification: Novell Products
Component: Incidents (show other bugs)
Version: unspecified
Hardware: Other Other
: P5 - None : Normal
Target Milestone: ---
Assignee: Security Team bot
QA Contact: Security Team bot
URL: https://smash.suse.de/issue/386023/
Whiteboard:
Keywords:
Depends on:
Blocks:
 
Reported: 2023-11-24 12:36 UTC by SMASH SMASH
Modified: 2023-11-24 12:43 UTC (History)
1 user (show)

See Also:
Found By: Security Response Team
Services Priority:
Business Priority:
Blocker: ---
Marketing QA Status: ---
IT Deployment: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description SMASH SMASH 2023-11-24 12:36:13 UTC
Bouncy Castle for Java 1.72 and earlier contains a potential Denial of Service (DoS) issue within the Bouncy Castle org.bouncycastle.openssl.PEMParser class. This class parses OpenSSL PEM encoded streams containing X.509 certificates, PKCS8 encoded keys, and PKCS7 objects. Parsing a file that has crafted ASN.1 data through the PEMParser causes an OutOfMemoryError, which can enable a denial of service attack.

The attack can be avoided by either updating or filtering PEM requests containing EXTERNAL tagged encodings.

We gratefully acknowledge assistance of the Amazon AWS Security Team in identifying this issue.

References:
https://github.com/bcgit/bc-java/wiki/CVE-2023-33202
Comment 1 Gabriele Sonnu 2023-11-24 12:43:06 UTC
We are on bouncycastle 1.74 on SLE, and bouncycastle 1.76 on Factory, so not affected. Closing.