Description
Bouncy Castle for Java before 1.73 contains a potential Denial of Service (DoS) issue within the Bouncy Castle org.bouncycastle.openssl.PEMParser class. This class parses OpenSSL PEM encoded streams containing X.509 certificates, PKCS8 encoded keys, and PKCS7 objects. Parsing a file that has crafted ASN.1 data through the PEMParser causes an OutOfMemoryError, which can enable a denial of service attack. (For users of the FIPS Java API: BC-FJA 1.0.2.3 and earlier are affected; BC-FJA 1.0.2.4 is fixed.)
Remediation
References
https://bouncycastle.org
https://github.com/bcgit/bc-java/wiki/CVE-2023-33202
https://security.netapp.com/advisory/ntap-20240125-0001/
Related Vulnerabilities
CVE-2023-25762 Vulnerability in maven package org.jenkins-ci.plugins:pipeline-build-step
CVE-2020-13697 Vulnerability in maven package org.nanohttpd:nanohttpd-nanolets
CVE-2023-41329 Vulnerability in maven package org.wiremock:wiremock
CVE-2020-17510 Vulnerability in maven package org.apache.shiro:shiro-spring-boot-web-starter
CVE-2020-28458 Vulnerability in maven package org.webjars.npm:datatables.net