CVE-2024-34702
Botan vulnerability analysis and mitigation

Overview

Botan, a C++ cryptography library, was found to have a vulnerability (CVE-2024-34702) in its X.509 certificate name constraints processing. Prior to versions 3.5.0 and 2.19.5, checking name constraints in X.509 certificates was quadratic in the number of names and name constraints. The vulnerability was discovered and reported by Bing Shi (GitHub Advisory).

Technical details

The vulnerability stems from inefficient processing of name constraints in X.509 certificates. An attacker could exploit this by presenting a certificate chain containing a large number of names in the SubjectAlternativeName, signed by a CA certificate with numerous name constraints. In proof-of-concept testing, a certificate containing 32K domain names signed by a certificate with 32K name constraints could cause verification to take several minutes (GitHub Advisory). The vulnerability has been assigned a CVSS v3.1 score of 5.3 MEDIUM (Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L) (NVD).

Impact

The vulnerability could allow an attacker to cause a denial of service condition by forcing the system to spend excessive time processing certificate name constraints. This could affect any application that relies on processing or verifying X.509 certificates, including almost all uses of TLS (GitHub Advisory).

Mitigation and workarounds

The issue has been fixed in Botan 3.5.0 and 2.19.5 through multiple improvements: signature chain verification is performed before checking other parameters, name constraint processing has been optimized, SubjectAlternativeName parsing has been improved, and a limit has been placed on the product of names and name constraints (220 in v3.5.0, 212 in v2.19.5). As a workaround for unpatched systems, applications can reject certificates with excessive name constraints (more than 128) before verification (GitHub Advisory).

Additional resources


SourceThis report was generated using AI

Related Botan vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2024-34703HIGH7.5
  • BotanBotan
  • libbotan-2-19-32bit
NoYesJun 30, 2024
CVE-2024-50383MEDIUM5.9
  • BotanBotan
  • Botan-doc
NoYesOct 23, 2024
CVE-2024-50382MEDIUM5.9
  • BotanBotan
  • libbotan-2-19
NoYesOct 23, 2024
CVE-2024-39312MEDIUM5.3
  • BotanBotan
  • libbotan-2-19-32bit
NoYesJul 08, 2024
CVE-2024-34702MEDIUM5.3
  • BotanBotan
  • python3-botan
NoYesJul 08, 2024

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management