Lucene search

K
cvelistGitHub_MCVELIST:CVE-2023-33958
HistoryJun 06, 2023 - 6:13 p.m.

CVE-2023-33958 Default `maxSignatureAttempts` in `notation verify` enables an endless data attack in notation

2023-06-0618:13:16
CWE-400
GitHub_M
www.cve.org
cve-2023-33958
notation verify
endless data attack
denial of service
oci artifacts
container images
notation packages
upgrade
restrict container registries

5.4 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

LOW

Availability Impact

LOW

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L

0.001 Low

EPSS

Percentile

33.9%

notation is a CLI tool to sign and verify OCI artifacts and container images. An attacker who has compromised a registry and added a high number of signatures to an artifact can cause denial of service of services on the machine, if a user runs notation verify command on the same machine. The problem has been fixed in the release v1.0.0-rc.6. Users should upgrade their notation packages to v1.0.0-rc.6 or above. Users unable to upgrade may restrict container registries to a set of secure and trusted container registries.

CNA Affected

[
  {
    "vendor": "notaryproject",
    "product": "notation",
    "versions": [
      {
        "version": "< 1.0.0-rc.6",
        "status": "affected"
      }
    ]
  }
]

5.4 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

LOW

Availability Impact

LOW

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L

0.001 Low

EPSS

Percentile

33.9%

Related for CVELIST:CVE-2023-33958