Lucene search

K
amazonAmazonALAS-2024-2506
HistoryMar 27, 2024 - 9:32 p.m.

Medium: python-jwcrypto

2024-03-2721:32:00
alas.aws.amazon.com
8
python-jwcrypto
dos attack
password brute-force
dictionary attack
cve-2023-6681
amazon linux 2
update

5.3 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

LOW

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L

6.8 Medium

AI Score

Confidence

Low

0.0004 Low

EPSS

Percentile

15.5%

Issue Overview:

A vulnerability was found in JWCrypto. This flaw allows an attacker to cause a denial of service (DoS) attack and possible password brute-force and dictionary attacks to be more resource-intensive. This issue can result in a large amount of computational consumption, causing a denial of service attack. (CVE-2023-6681)

Affected Packages:

python-jwcrypto

Note:

This advisory is applicable to Amazon Linux 2 (AL2) Core repository. Visit this FAQ section for the difference between AL2 Core and AL2 Extras advisories.

Issue Correction:
Run yum update python-jwcrypto to update your system.

New Packages:

noarch:  
    python-jwcrypto-0.4.2-1.amzn2.0.1.noarch  
  
src:  
    python-jwcrypto-0.4.2-1.amzn2.0.1.src  

Additional References

Red Hat: CVE-2023-6681

Mitre: CVE-2023-6681

OSVersionArchitecturePackageVersionFilename
Amazon Linux2noarchpython-jwcrypto< 0.4.2-1.amzn2.0.1python-jwcrypto-0.4.2-1.amzn2.0.1.noarch.rpm

5.3 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

LOW

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L

6.8 Medium

AI Score

Confidence

Low

0.0004 Low

EPSS

Percentile

15.5%