CVE-2016-9121

go-jose before 1.0.4 suffers from an invalid curve attack for the ECDH-ES algorithm. When deriving a shared key using ECDH-ES for an encrypted message, go-jose neglected to check that the received public key on a message is on the same curve as the static private key of the receiver, thus making it vulnerable to an invalid curve attack.
References
Link Resource
https://hackerone.com/reports/164590 Permissions Required
https://github.com/square/go-jose/commit/c7581939a3656bb65e89d64da0a52364a33d2507 Issue Tracking Patch Third Party Advisory
http://www.openwall.com/lists/oss-security/2016/11/03/1 Mailing List Patch Third Party Advisory
Advertisement

NeevaHost hosting service

Configurations

Configuration 1 (hide)

cpe:2.3:a:go-jose_project:go-jose:*:*:*:*:*:*:*:*

Information

Published : 2017-03-27 19:59

Updated : 2017-03-29 10:39


NVD link : CVE-2016-9121

Mitre link : CVE-2016-9121


JSON object : View

CWE
CWE-326

Inadequate Encryption Strength

Advertisement

dedicated server usa

Products Affected

go-jose_project

  • go-jose