Lucene search

K
cvelistGitHub_MCVELIST:CVE-2023-33957
HistoryJun 06, 2023 - 6:10 p.m.

CVE-2023-33957 Denial of service from high number of artifact signatures in notation

2023-06-0618:10:30
CWE-400
GitHub_M
www.cve.org
cve-2023-33957
denial of service
notation cli

2.6 Low

CVSS3

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

HIGH

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

LOW

CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:C/C:N/I:N/A:L

0.001 Low

EPSS

Percentile

32.8%

notation is a CLI tool to sign and verify OCI artifacts and container images. An attacker who has compromised a registry and added a high number of signatures to an artifact can cause denial of service of services on the machine, if a user runs notation inspect command on the same machine. The problem has been fixed in the release v1.0.0-rc.6. Users should upgrade their notation packages to v1.0.0-rc.6 or above. Users are advised to upgrade. Users unable to upgrade may restrict container registries to a set of secure and trusted container registries.

CNA Affected

[
  {
    "vendor": "notaryproject",
    "product": "notation",
    "versions": [
      {
        "version": "< 1.0.0-rc.6",
        "status": "affected"
      }
    ]
  }
]

2.6 Low

CVSS3

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

HIGH

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

LOW

CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:C/C:N/I:N/A:L

0.001 Low

EPSS

Percentile

32.8%

Related for CVELIST:CVE-2023-33957