teerth04 / ticket

Other
0 stars 0 forks source link

Findings for Container Security, Low, [TheRedHatter/javagoof:exploits/tomcat-rce/Dockerfile]:Cryptographic Issues #1732

Open armorcodegithubpreprod[bot] opened 3 months ago

armorcodegithubpreprod[bot] commented 3 months ago

Findings for Container Security, Low, [TheRedHatter/javagoof:exploits/tomcat-rce/Dockerfile]:Cryptographic Issues

Component Details

OpenSSL 0.9.8i on the Gaisler Research LEON3 SoC on the Xilinx Virtex-II Pro FPGA uses a Fixed Width Exponentiation (FWE) algorithm for certain signature calculations, and does not verify the signature before providing it to a caller, which makes it easier for physically proximate attackers to determine the private key via a modified supply voltage for the microprocessor, related to a "fault-based attack."

References

Origin : null Type : null Image Id : null

Snyk Project Status: Active



Component Details

The NIST SP 800-90A default statement of the Dual Elliptic Curve Deterministic Random Bit Generation (Dual_EC_DRBG) algorithm contains point Q constants with a possible relationship to certain "skeleton key" values, which might allow context-dependent attackers to defeat cryptographic protection mechanisms by leveraging knowledge of those values. NOTE: this is a preliminary CVE for Dual_EC_DRBG; future research may provide additional details about point Q and associated attacks, and could potentially lead to a RECAST or REJECT of this CVE.

References

Origin : null Type : null Image Id : null

Snyk Project Status: Active



Component Details

The nss_parse_ciphers function in libraries/libldap/tls_m.c in OpenLDAP does not properly parse OpenSSL-style multi-keyword mode cipher strings, which might cause a weaker than intended cipher to be used and allow remote attackers to have unspecified impact via unknown vectors.

References

Origin : null Type : null Image Id : null

Snyk Project Status: Active



Component Details

DISPUTED GLib 2.31.8 and earlier, when the g_str_hash function is used, computes hash values without restricting the ability to trigger hash collisions predictably, which allows context-dependent attackers to cause a denial of service (CPU consumption) via crafted input to an application that maintains a hash table. NOTE: this issue may be disputed by the vendor; the existence of the g_str_hash function is not a vulnerability in the library, because callers of g_hash_table_new and g_hash_table_new_full can specify an arbitrary hash function that is appropriate for the application.

References

Origin : null Type : null Image Id : null

Snyk Project Status: Active



armorcodegithubpreprod[bot] commented 3 months ago

Finding [47833709|https://preprod.armorcode.ai/#/findings/257/1167/47833709], [47833642|https://preprod.armorcode.ai/#/findings/257/1167/47833642], [47833652|https://preprod.armorcode.ai/#/findings/257/1167/47833652], [47833643|https://preprod.armorcode.ai/#/findings/257/1167/47833643] are Mitigated
by SYSTEM via ArmorCode Platform