blob: 1ce7722c1ceb78536ea09bee03a08399d3891952 [file] [log] [blame]
id: GO-2020-0009
modules:
- module: github.com/square/go-jose
versions:
- fixed: 0.0.0-20160903044734-789a4c4bd4c1
vulnerable_at: 0.0.0-20160831221313-d00415a0a4fd
packages:
- package: github.com/square/go-jose/cipher
goarch:
- "386"
- arm
- armbe
- amd64p32
- mips
- mipsle
- mips64p32
- mips64p32le
- ppc
- riscv
- s390
- sparc
symbols:
- cbcAEAD.computeAuthTag
derived_symbols:
- cbcAEAD.Open
- cbcAEAD.Seal
- package: github.com/square/go-jose
goarch:
- "386"
- arm
- armbe
- amd64p32
- mips
- mipsle
- mips64p32
- mips64p32le
- ppc
- riscv
- s390
- sparc
symbols:
- JsonWebEncryption.Decrypt
derived_symbols:
- genericEncrypter.Encrypt
- genericEncrypter.EncryptWithAuthData
summary: Integer overflow in github.com/square/go-jose
description: |-
On 32-bit platforms an attacker can manipulate a ciphertext encrypted with
AES-CBC with HMAC such that they can control how large the input buffer is when
computing the HMAC authentication tag. This can can allow a manipulated
ciphertext to be verified as authentic, opening the door for padding oracle
attacks.
published: 2021-04-14T20:04:52Z
cves:
- CVE-2016-9123
ghsas:
- GHSA-3fx4-7f69-5mmg
credits:
- Quan Nguyen from Google's Information Security Engineering Team
references:
- fix: https://github.com/square/go-jose/commit/789a4c4bd4c118f7564954f441b29c153ccd6a96
- web: https://www.openwall.com/lists/oss-security/2016/11/03/1