Bug 1219837 (CVE-2023-6681) - VUL-0: CVE-2023-6681: python-jwcrypto: denial of service Via specifically crafted JWE
Summary: VUL-0: CVE-2023-6681: python-jwcrypto: denial of service Via specifically cr...
Status: NEW
Alias: CVE-2023-6681
Product: openSUSE Distribution
Classification: openSUSE
Component: Security (show other bugs)
Version: Leap 15.6
Hardware: Other Other
: P3 - Medium : Normal (vote)
Target Milestone: ---
Assignee: Michael Ströder
QA Contact: Security Team bot
URL: https://smash.suse.de/issue/393715/
Whiteboard:
Keywords:
Depends on:
Blocks:
 
Reported: 2024-02-12 14:14 UTC by SMASH SMASH
Modified: 2024-02-12 14:15 UTC (History)
1 user (show)

See Also:
Found By: Security Response Team
Services Priority:
Business Priority:
Blocker: ---
Marketing QA Status: ---
IT Deployment: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description SMASH SMASH 2024-02-12 14:14:13 UTC
The JWE key management algorithms based on PBKDF2 require a JOSE Header Parameter called p2c (PBES2 Count). This parameter dictates the number of PBKDF2 iterations needed to derive a CEK wrapping key. Its primary purpose is to intentionally slow down the key derivation function, making password brute-force and dictionary attacks more resource- intensive.

Therefore, if an attacker sets the p2c parameter in JWE to a very large
number, it can cause a lot of computational consumption, resulting in a DOS attack

References:
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-6681
https://bugzilla.redhat.com/show_bug.cgi?id=2260843