Find, fix and prevent vulnerabilities in your code.
medium severity
- Vulnerable module: org.bouncycastle:bcpkix-jdk18on
- Introduced through: org.bouncycastle:bcpkix-jdk18on@1.78.1
Detailed paths
-
Introduced through: mariadb/mariadb-connector-j@mariadb/mariadb-connector-j#5222bfb7b30f8bcb71447b03d86843e872d19ec2 › org.bouncycastle:bcpkix-jdk18on@1.78.1Remediation: Upgrade to org.bouncycastle:bcpkix-jdk18on@1.79.
Overview
Affected versions of this package are vulnerable to Allocation of Resources Without Limits or Throttling due to improper processing of large name constraint structures in PKIXCertPathReviewer. An attacker can cause excessive resource allocation by submitting specially crafted ASN.1 objects, potentially leading to service disruption.
Workaround
This vulnerability can be mitigated by limiting the size of ASN.1 objects that can be loaded from untrusted sources, thereby capping the maximum size of a Name Constraints structure.
Remediation
Upgrade org.bouncycastle:bcpkix-jdk18on to version 1.79 or higher.
References
medium severity
- Vulnerable module: org.bouncycastle:bcprov-jdk18on
- Introduced through: org.bouncycastle:bcpkix-jdk18on@1.78.1
Detailed paths
-
Introduced through: mariadb/mariadb-connector-j@mariadb/mariadb-connector-j#5222bfb7b30f8bcb71447b03d86843e872d19ec2 › org.bouncycastle:bcpkix-jdk18on@1.78.1 › org.bouncycastle:bcprov-jdk18on@1.78.1Remediation: Upgrade to org.bouncycastle:bcpkix-jdk18on@1.79.
-
Introduced through: mariadb/mariadb-connector-j@mariadb/mariadb-connector-j#5222bfb7b30f8bcb71447b03d86843e872d19ec2 › org.bouncycastle:bcpkix-jdk18on@1.78.1 › org.bouncycastle:bcutil-jdk18on@1.78.1 › org.bouncycastle:bcprov-jdk18on@1.78.1Remediation: Upgrade to org.bouncycastle:bcpkix-jdk18on@1.79.
Overview
Affected versions of this package are vulnerable to Allocation of Resources Without Limits or Throttling due to improper processing of large name constraint structures in PKIXCertPathReviewer. An attacker can cause excessive resource allocation by submitting specially crafted ASN.1 objects, potentially leading to service disruption.
Workaround
This vulnerability can be mitigated by limiting the size of ASN.1 objects that can be loaded from untrusted sources, thereby capping the maximum size of a Name Constraints structure.
Remediation
Upgrade org.bouncycastle:bcprov-jdk18on to version 1.79 or higher.