CVE-2016-9121

go-jose before 1.0.4 suffers from an invalid curve attack for the ECDH-ES algorithm. When deriving a shared key using ECDH-ES for an encrypted message, go-jose neglected to check that the received public key on a message is on the same curve as the static private key of the receiver, thus making it vulnerable to an invalid curve attack.
References
Link Resource
http://www.openwall.com/lists/oss-security/2016/11/03/1 Mailing List Patch Third Party Advisory
https://github.com/square/go-jose/commit/c7581939a3656bb65e89d64da0a52364a33d2507 Issue Tracking Patch Third Party Advisory
https://hackerone.com/reports/164590 Permissions Required
Configurations

Configuration 1 (hide)

cpe:2.3:a:go-jose_project:go-jose:*:*:*:*:*:*:*:*

History

No history.

Information

Published : 2017-03-28 02:59

Updated : 2023-12-10 12:01


NVD link : CVE-2016-9121

Mitre link : CVE-2016-9121

CVE.ORG link : CVE-2016-9121


JSON object : View

Products Affected

go-jose_project

  • go-jose
CWE
CWE-326

Inadequate Encryption Strength