Bug 1227239 - VUL-0: CVE-2024-34703: MozillaThunderbird: Botan: denial of service due to overly large elliptic curve parameters
Summary: VUL-0: CVE-2024-34703: MozillaThunderbird: Botan: denial of service due to ov...
Status: NEW
Alias: None
Product: SUSE Security Incidents
Classification: Novell Products
Component: Incidents (show other bugs)
Version: unspecified
Hardware: Other Other
: P3 - Medium : Normal
Target Milestone: ---
Assignee: Mozilla Bugs
QA Contact: Security Team bot
URL: https://smash.suse.de/issue/412444/
Whiteboard:
Keywords:
Depends on:
Blocks: CVE-2024-34703
  Show dependency treegraph
 
Reported: 2024-07-01 14:07 UTC by Camila Camargo de Matos
Modified: 2024-07-12 12:30 UTC (History)
4 users (show)

See Also:
Found By: Security Response Team
Services Priority:
Business Priority:
Blocker: ---
Marketing QA Status: ---
IT Deployment: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Camila Camargo de Matos 2024-07-01 14:07:32 UTC
+++ This bug was initially created as a clone of Bug #1227238 +++

Botan is a C++ cryptography library. X.509 certificates can identify elliptic curves using either an object identifier or using explicit encoding of the parameters. Prior to versions 3.3.0 and 2.19.4, an attacker could present an ECDSA X.509 certificate using explicit encoding where the parameters are very large. The proof of concept used a 16Kbit prime for this purpose. When parsing, the parameter is checked to be prime, causing excessive computation. This was patched in 2.19.4 and 3.3.0 to allow the prime parameter of the elliptic curve to be at most 521 bits. No known workarounds are available. Note that support for explicit encoding of elliptic curve parameters is deprecated in Botan.

References:
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2024-34703
https://www.cve.org/CVERecord?id=CVE-2024-34703
https://github.com/randombit/botan/commit/08c404b23740babee1f6aa51b54e966029aadee4
https://github.com/randombit/botan/commit/94e9154c143aa5264da6254a6a1be5bc66ee2b5a
https://github.com/randombit/botan/security/advisories/GHSA-w4g2-7m2h-7xj7
https://bugzilla.redhat.com/show_bug.cgi?id=2294868
Comment 2 Martin Sirringhaus 2024-07-02 14:59:16 UTC
The upstream fix applies cleanly to the vendored botan-version. I will prepare submissions.
Comment 4 Maintenance Automation 2024-07-12 12:30:09 UTC
SUSE-SU-2024:2415-1: An update that solves one vulnerability and has one security fix can now be installed.

Category: security (moderate)
Bug References: 1226495, 1227239
CVE References: CVE-2024-34703
Maintenance Incident: [SUSE:Maintenance:34542](https://smelt.suse.de/incident/34542/)
Sources used:
openSUSE Leap 15.5 (src):
 MozillaThunderbird-115.12.2-150200.8.168.1
openSUSE Leap 15.6 (src):
 MozillaThunderbird-115.12.2-150200.8.168.1
SUSE Package Hub 15 15-SP5 (src):
 MozillaThunderbird-115.12.2-150200.8.168.1
SUSE Package Hub 15 15-SP6 (src):
 MozillaThunderbird-115.12.2-150200.8.168.1
SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (src):
 MozillaThunderbird-115.12.2-150200.8.168.1
SUSE Linux Enterprise Workstation Extension 15 SP5 (src):
 MozillaThunderbird-115.12.2-150200.8.168.1
SUSE Linux Enterprise Workstation Extension 15 SP6 (src):
 MozillaThunderbird-115.12.2-150200.8.168.1

NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.