-
Notifications
You must be signed in to change notification settings - Fork 2k
Closed
Labels
lifecycle/rottenDenotes an issue or PR that has aged beyond stale and will be auto-closed.Denotes an issue or PR that has aged beyond stale and will be auto-closed.
Description
Describe the bug
Based on SONATYPE-2019-0673, there is no upgrade path for this dependency. Is there any alternative option or a workaround to address this vulnerability? Thanks!
Vulnerability
Issue
sonatype-2019-0673
Severity
Sonatype CVSS 3: 3.7
CVE CVSS 2.0: 0.0
Weakness
Sonatype CWE: [400](https://cwe.mitre.org/data/definitions/400.html)
Source
Sonatype Data Research
Categories
Data
Description
Explanation
Bouncy Castle is vulnerable to Denial of Service (DoS). The Dump.class file utilises FileInputStreams objects when reading from user-provided files, but fails to close these streams properly. This can lead to resource leaks, potentially enabling an attacker to exhaust resources by providing a crafted file as an input to the application, thereby triggering a DoS condition.
Detection
The application is vulnerable by using this component.
Recommendation
There is no non-vulnerable upgrade path for this component. We recommend investigating alternative components or potential mitigating control.
Root Cause
bugvm-dist-1.0.8.tar.gz <= bugvm-1.0.8/lib/bugvm-dist-compiler.jar <= org/bouncycastle/asn1/util/Dump.class : [1.46, )
Advisories
Project: https://github.com/bcgit/bc-java/issues/634
CVSS Details
Sonatype CVSS 3: 3.7
CVSS Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
https://cwe.mitre.org/data/definitions/400.html
Client Version
14.0.1
Metadata
Metadata
Assignees
Labels
lifecycle/rottenDenotes an issue or PR that has aged beyond stale and will be auto-closed.Denotes an issue or PR that has aged beyond stale and will be auto-closed.