{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2024-21664","assignerOrgId":"a0819718-46f1-4df5-94e2-005712e83aaa","state":"PUBLISHED","assignerShortName":"GitHub_M","dateReserved":"2023-12-29T16:10:20.367Z","datePublished":"2024-01-09T19:18:03.742Z","dateUpdated":"2025-06-17T20:59:10.877Z"},"containers":{"cna":{"title":"Parsing JSON serialized payload without protected field can lead to segfault","problemTypes":[{"descriptions":[{"cweId":"CWE-476","lang":"en","description":"CWE-476: NULL Pointer Dereference","type":"CWE"}]}],"metrics":[{"cvssV3_1":{"attackComplexity":"LOW","attackVector":"NETWORK","availabilityImpact":"LOW","baseScore":4.3,"baseSeverity":"MEDIUM","confidentialityImpact":"NONE","integrityImpact":"NONE","privilegesRequired":"NONE","scope":"UNCHANGED","userInteraction":"REQUIRED","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L","version":"3.1"}}],"references":[{"name":"https://github.com/lestrrat-go/jwx/security/advisories/GHSA-pvcr-v8j8-j5q3","tags":["x_refsource_CONFIRM"],"url":"https://github.com/lestrrat-go/jwx/security/advisories/GHSA-pvcr-v8j8-j5q3"},{"name":"https://github.com/lestrrat-go/jwx/commit/0e8802ce6842625845d651456493e7c87625601f","tags":["x_refsource_MISC"],"url":"https://github.com/lestrrat-go/jwx/commit/0e8802ce6842625845d651456493e7c87625601f"},{"name":"https://github.com/lestrrat-go/jwx/commit/8c53d0ae52d5ab1e2b37c5abb67def9e7958fd65","tags":["x_refsource_MISC"],"url":"https://github.com/lestrrat-go/jwx/commit/8c53d0ae52d5ab1e2b37c5abb67def9e7958fd65"},{"name":"https://github.com/lestrrat-go/jwx/commit/d69a721931a5c48b9850a42404f18e143704adcd","tags":["x_refsource_MISC"],"url":"https://github.com/lestrrat-go/jwx/commit/d69a721931a5c48b9850a42404f18e143704adcd"}],"affected":[{"vendor":"lestrrat-go","product":"jwx","versions":[{"version":">= 2.0.0, < 2.0.19","status":"affected"},{"version":">= 1.0.8, < 1.2.28","status":"affected"}]}],"providerMetadata":{"orgId":"a0819718-46f1-4df5-94e2-005712e83aaa","shortName":"GitHub_M","dateUpdated":"2024-02-05T15:37:42.909Z"},"descriptions":[{"lang":"en","value":"jwx is a Go module implementing various JWx (JWA/JWE/JWK/JWS/JWT, otherwise known as JOSE) technologies. Calling `jws.Parse` with a JSON serialized payload where the `signature` field is present while `protected` is absent can lead to a nil pointer dereference. The vulnerability can be used to crash/DOS a system doing JWS verification. This vulnerability has been patched in versions 2.0.19 and 1.2.28.\n"}],"source":{"advisory":"GHSA-pvcr-v8j8-j5q3","discovery":"UNKNOWN"}},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-01T22:27:36.099Z"},"title":"CVE Program Container","references":[{"name":"https://github.com/lestrrat-go/jwx/security/advisories/GHSA-pvcr-v8j8-j5q3","tags":["x_refsource_CONFIRM","x_transferred"],"url":"https://github.com/lestrrat-go/jwx/security/advisories/GHSA-pvcr-v8j8-j5q3"},{"name":"https://github.com/lestrrat-go/jwx/commit/0e8802ce6842625845d651456493e7c87625601f","tags":["x_refsource_MISC","x_transferred"],"url":"https://github.com/lestrrat-go/jwx/commit/0e8802ce6842625845d651456493e7c87625601f"},{"name":"https://github.com/lestrrat-go/jwx/commit/8c53d0ae52d5ab1e2b37c5abb67def9e7958fd65","tags":["x_refsource_MISC","x_transferred"],"url":"https://github.com/lestrrat-go/jwx/commit/8c53d0ae52d5ab1e2b37c5abb67def9e7958fd65"},{"name":"https://github.com/lestrrat-go/jwx/commit/d69a721931a5c48b9850a42404f18e143704adcd","tags":["x_refsource_MISC","x_transferred"],"url":"https://github.com/lestrrat-go/jwx/commit/d69a721931a5c48b9850a42404f18e143704adcd"}]},{"metrics":[{"other":{"type":"ssvc","content":{"id":"CVE-2024-21664","role":"CISA Coordinator","options":[{"Exploitation":"poc"},{"Automatable":"no"},{"Technical Impact":"partial"}],"version":"2.0.3","timestamp":"2024-01-09T21:08:07.994274Z"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2025-06-17T20:59:10.877Z"}}]}}