CVE-2024-23684

Inefficient algorithmic complexity in DecodeFromBytes function in com.upokecenter.cbor Java implementation of Concise Binary Object Representation (CBOR) versions 4.0.0 to 4.5.1 allows an attacker to cause a denial of service by passing a maliciously crafted input. Depending on an application's use of this library, this may be a remote attacker.
Configurations

Configuration 1 (hide)

cpe:2.3:a:peteroupc:cbor:*:*:*:*:*:.net:*:*

History

29 Nov 2025, 02:15

Type Values Removed Values Added
Summary (en) Inefficient algorithmic complexity in DecodeFromBytes function in com.upokecenter.cbor Java implementation of Concise Binary Object Representation (CBOR) versions 4.0.0 to 4.5.1 allows an attacker to cause a denial of service by passing a maliciously crafted input. Depending on an application's use of this library, this may be a remote attacker. (en) Inefficient algorithmic complexity in DecodeFromBytes function in com.upokecenter.cbor Java implementation of Concise Binary Object Representation (CBOR) versions 4.0.0 to 4.5.1 allows an attacker to cause a denial of service by passing a maliciously crafted input. Depending on an application's use of this library, this may be a remote attacker.

21 Nov 2024, 08:58

Type Values Removed Values Added
References () https://github.com/advisories/GHSA-fj2w-wfgv-mwq6 - Mitigation, Third Party Advisory () https://github.com/advisories/GHSA-fj2w-wfgv-mwq6 - Mitigation, Third Party Advisory
References () https://github.com/peteroupc/CBOR-Java/security/advisories/GHSA-fj2w-wfgv-mwq6 - Vendor Advisory () https://github.com/peteroupc/CBOR-Java/security/advisories/GHSA-fj2w-wfgv-mwq6 - Vendor Advisory
References () https://vulncheck.com/advisories/vc-advisory-GHSA-fj2w-wfgv-mwq6 - Third Party Advisory () https://vulncheck.com/advisories/vc-advisory-GHSA-fj2w-wfgv-mwq6 - Third Party Advisory

26 Jan 2024, 18:06

Type Values Removed Values Added
CWE CWE-407
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.5
First Time Peteroupc
Peteroupc cbor
CPE cpe:2.3:a:peteroupc:cbor:*:*:*:*:*:.net:*:*
References () https://vulncheck.com/advisories/vc-advisory-GHSA-fj2w-wfgv-mwq6 - () https://vulncheck.com/advisories/vc-advisory-GHSA-fj2w-wfgv-mwq6 - Third Party Advisory
References () https://github.com/advisories/GHSA-fj2w-wfgv-mwq6 - () https://github.com/advisories/GHSA-fj2w-wfgv-mwq6 - Mitigation, Third Party Advisory
References () https://github.com/peteroupc/CBOR-Java/security/advisories/GHSA-fj2w-wfgv-mwq6 - () https://github.com/peteroupc/CBOR-Java/security/advisories/GHSA-fj2w-wfgv-mwq6 - Vendor Advisory

19 Jan 2024, 22:52

Type Values Removed Values Added
New CVE

Information

Published : 2024-01-19 21:15

Updated : 2025-11-29 02:15


NVD link : CVE-2024-23684

Mitre link : CVE-2024-23684

CVE.ORG link : CVE-2024-23684


JSON object : View

Products Affected

peteroupc

  • cbor
CWE
CWE-407

Inefficient Algorithmic Complexity