vulnerability
Red Hat JBossEAP: Out-of-bounds Read (CVE-2024-29857)
Severity | CVSS | Published | Added | Modified |
---|---|---|---|---|
8 | (AV:N/AC:L/Au:N/C:N/I:N/A:C) | 2024-06-14 | 2024-09-19 | 2024-12-20 |
Severity
8
CVSS
(AV:N/AC:L/Au:N/C:N/I:N/A:C)
Published
2024-06-14
Added
2024-09-19
Modified
2024-12-20
Description
An issue was discovered in ECCurve.java and ECCurve.cs in Bouncy Castle Java (BC Java) before 1.78, BC Java LTS before 2.73.6, BC-FJA before 1.0.2.5, and BC C# .Net before 2.3.1. Importing an EC certificate with crafted F2m parameters can lead to excessive CPU consumption during the evaluation of the curve parameters.. A vulnerability was found in Bouncy Castle. An issue was discovered in ECCurve.java and ECCurve.cs in Bouncy Castle Java (BC Java). Importing an EC certificate with crafted F2m parameters can lead to excessive CPU consumption during the evaluation of the curve parameters.
Solution
red-hat-jboss-eap-upgrade-latest
References
- CVE-2024-29857
- https://attackerkb.com/topics/CVE-2024-29857
- URL-https://access.redhat.com/security/cve/CVE-2024-29857
- URL-https://bugzilla.redhat.com/show_bug.cgi?id=2293028
- URL-https://access.redhat.com/errata/RHSA-2024:5143
- URL-https://access.redhat.com/errata/RHSA-2024:5144
- URL-https://access.redhat.com/errata/RHSA-2024:5145
- URL-https://access.redhat.com/errata/RHSA-2024:5147
- URL-https://access.redhat.com/errata/RHSA-2024:5479
- URL-https://access.redhat.com/errata/RHSA-2024:5481
- URL-https://access.redhat.com/errata/RHSA-2024:5482

NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.