2024-05-26 14:27:05 +02:00
### [CVE-2019-17359](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17359)



### Description
The ASN.1 parser in Bouncy Castle Crypto (aka BC Java) 1.63 can trigger a large attempted memory allocation, and resultant OutOfMemoryError error, via crafted ASN.1 data. This is fixed in 1.64.
### POC
#### Reference
- https://www.oracle.com/security-alerts/cpuapr2020.html
- https://www.oracle.com/security-alerts/cpujan2020.html
- https://www.oracle.com/security-alerts/cpujan2021.html
- https://www.oracle.com/security-alerts/cpujul2020.html
- https://www.oracle.com/security-alerts/cpuoct2020.html
#### Github
- https://github.com/Anonymous-Phunter/PHunter
- https://github.com/CGCL-codes/PHunter
- https://github.com/DennisFeldbusch/Fuzz
- https://github.com/GCFuzzer/SP2023
2024-06-22 09:37:59 +00:00
- https://github.com/LibHunter/LibHunter
2024-05-26 14:27:05 +02:00
- https://github.com/hwen020/JQF
- https://github.com/mfatima1/CS182
- https://github.com/moudemans/GFuzz
- https://github.com/olli22221/jqf
- https://github.com/qibowen-99/JQF_TEST
- https://github.com/rohanpadhye/JQF
- https://github.com/sarahc7/jqf-gson