An issue was discovered in ECCurve.java and ECCurve.cs in Bouncy Castle Java (BC Java) before 1.78, BC Java LTS before 2.73.6, BC-FJA before 1.0.2.5, and BC C# .Net before 2.3.1. Importing an EC certificate with crafted F2m parameters can lead to excessive CPU consumption during the evaluation of the curve parameters.
Metrics
Affected Vendors & Products
References
History
Fri, 06 Dec 2024 14:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
References |
|
Fri, 06 Dec 2024 14:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Bouncycastle
Bouncycastle bc-fja Bouncycastle bc-java Bouncycastle bc C .net |
|
CPEs | cpe:2.3:a:bouncycastle:bc-fja:*:*:*:*:*:*:*:* cpe:2.3:a:bouncycastle:bc-java:*:*:*:*:*:*:*:* cpe:2.3:a:bouncycastle:bc_c_.net:*:*:*:*:*:*:*:* |
|
Vendors & Products |
Bouncycastle
Bouncycastle bc-fja Bouncycastle bc-java Bouncycastle bc C .net |
|
Metrics |
ssvc
|
Fri, 16 Aug 2024 18:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
CPEs | cpe:/a:redhat:jboss_enterprise_application_platform:8.0 cpe:/a:redhat:jboss_enterprise_application_platform:8.0::el8 cpe:/a:redhat:jboss_enterprise_application_platform:8.0::el9 |
Thu, 15 Aug 2024 20:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Weaknesses | CWE-125 | |
Metrics |
cvssV3_1
|
cvssV3_1
|
Fri, 09 Aug 2024 02:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Redhat jboss Enterprise Application Platform
|
|
CPEs | cpe:/a:redhat:jboss_enterprise_application_platform:7.4 cpe:/a:redhat:jboss_enterprise_application_platform:7.4::el7 cpe:/a:redhat:jboss_enterprise_application_platform:7.4::el8 cpe:/a:redhat:jboss_enterprise_application_platform:7.4::el9 |
|
Vendors & Products |
Redhat jboss Enterprise Application Platform
|

Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2025-02-13T15:47:48.325Z
Reserved: 2024-03-21T00:00:00.000Z
Link: CVE-2024-29857

Updated: 2024-12-06T13:09:29.357Z

Status : Awaiting Analysis
Published: 2024-05-14T15:17:02.970
Modified: 2024-12-06T14:15:20.263
Link: CVE-2024-29857
