mirror of
https://github.com/0xMarcio/cve.git
synced 2025-06-01 11:10:36 +00:00
32 lines
1.3 KiB
Markdown
32 lines
1.3 KiB
Markdown
![]() |
### [CVE-2019-17359](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17359)
|
||
|

|
||
|

|
||
|

|
||
|
|
||
|
### Description
|
||
|
|
||
|
The ASN.1 parser in Bouncy Castle Crypto (aka BC Java) 1.63 can trigger a large attempted memory allocation, and resultant OutOfMemoryError error, via crafted ASN.1 data. This is fixed in 1.64.
|
||
|
|
||
|
### POC
|
||
|
|
||
|
#### Reference
|
||
|
- https://www.oracle.com/security-alerts/cpuapr2020.html
|
||
|
- https://www.oracle.com/security-alerts/cpujan2020.html
|
||
|
- https://www.oracle.com/security-alerts/cpujan2021.html
|
||
|
- https://www.oracle.com/security-alerts/cpujul2020.html
|
||
|
- https://www.oracle.com/security-alerts/cpuoct2020.html
|
||
|
|
||
|
#### Github
|
||
|
- https://github.com/Anonymous-Phunter/PHunter
|
||
|
- https://github.com/CGCL-codes/PHunter
|
||
|
- https://github.com/DennisFeldbusch/Fuzz
|
||
|
- https://github.com/GCFuzzer/SP2023
|
||
|
- https://github.com/hwen020/JQF
|
||
|
- https://github.com/mfatima1/CS182
|
||
|
- https://github.com/moudemans/GFuzz
|
||
|
- https://github.com/olli22221/jqf
|
||
|
- https://github.com/qibowen-99/JQF_TEST
|
||
|
- https://github.com/rohanpadhye/JQF
|
||
|
- https://github.com/sarahc7/jqf-gson
|
||
|
|