fkie_cve-2023-3817
Vulnerability from fkie_nvd
Published
2023-07-31 16:15
Modified
2024-11-21 08:18
Summary
Issue summary: Checking excessively long DH keys or parameters may be very slow. Impact summary: Applications that use the functions DH_check(), DH_check_ex() or EVP_PKEY_param_check() to check a DH key or DH parameters may experience long delays. Where the key or parameters that are being checked have been obtained from an untrusted source this may lead to a Denial of Service. The function DH_check() performs various checks on DH parameters. After fixing CVE-2023-3446 it was discovered that a large q parameter value can also trigger an overly long computation during some of these checks. A correct q value, if present, cannot be larger than the modulus p parameter, thus it is unnecessary to perform these checks if q is larger than p. An application that calls DH_check() and supplies a key or parameters obtained from an untrusted source could be vulnerable to a Denial of Service attack. The function DH_check() is itself called by a number of other OpenSSL functions. An application calling any of those other functions may similarly be affected. The other functions affected by this are DH_check_ex() and EVP_PKEY_param_check(). Also vulnerable are the OpenSSL dhparam and pkeyparam command line applications when using the "-check" option. The OpenSSL SSL/TLS implementation is not affected by this issue. The OpenSSL 3.0 and 3.1 FIPS providers are not affected by this issue.
References
openssl-security@openssl.orghttps://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=6a1eb62c29db6cb5eec707f9338aee00f44e26f5Mailing List, Patch
openssl-security@openssl.orghttps://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=869ad69aadd985c7b8ca6f4e5dd0eb274c9f3644Broken Link
openssl-security@openssl.orghttps://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=9002fd07327a91f35ba6c1307e71fa6fd4409b7fMailing List, Patch
openssl-security@openssl.orghttps://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=91ddeba0f2269b017dc06c46c993a788974b1aa5Mailing List, Patch
openssl-security@openssl.orghttps://www.openssl.org/news/secadv/20230731.txtVendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://seclists.org/fulldisclosure/2023/Jul/43
af854a3a-2127-422b-91ae-364da2661108http://www.openwall.com/lists/oss-security/2023/07/31/1
af854a3a-2127-422b-91ae-364da2661108http://www.openwall.com/lists/oss-security/2023/09/22/11
af854a3a-2127-422b-91ae-364da2661108http://www.openwall.com/lists/oss-security/2023/09/22/9
af854a3a-2127-422b-91ae-364da2661108http://www.openwall.com/lists/oss-security/2023/11/06/2
af854a3a-2127-422b-91ae-364da2661108https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=6a1eb62c29db6cb5eec707f9338aee00f44e26f5Mailing List, Patch
af854a3a-2127-422b-91ae-364da2661108https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=869ad69aadd985c7b8ca6f4e5dd0eb274c9f3644Broken Link
af854a3a-2127-422b-91ae-364da2661108https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=9002fd07327a91f35ba6c1307e71fa6fd4409b7fMailing List, Patch
af854a3a-2127-422b-91ae-364da2661108https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=91ddeba0f2269b017dc06c46c993a788974b1aa5Mailing List, Patch
af854a3a-2127-422b-91ae-364da2661108https://lists.debian.org/debian-lts-announce/2023/08/msg00019.html
af854a3a-2127-422b-91ae-364da2661108https://security.gentoo.org/glsa/202402-08
af854a3a-2127-422b-91ae-364da2661108https://security.netapp.com/advisory/ntap-20230818-0014/
af854a3a-2127-422b-91ae-364da2661108https://security.netapp.com/advisory/ntap-20231027-0008/
af854a3a-2127-422b-91ae-364da2661108https://security.netapp.com/advisory/ntap-20240621-0006/
af854a3a-2127-422b-91ae-364da2661108https://www.openssl.org/news/secadv/20230731.txtVendor Advisory
Impacted products
Vendor Product Version
openssl openssl *
openssl openssl *
openssl openssl 1.0.2
openssl openssl 1.0.2
openssl openssl 1.0.2
openssl openssl 1.0.2
openssl openssl 1.0.2a
openssl openssl 1.0.2b
openssl openssl 1.0.2c
openssl openssl 1.0.2d
openssl openssl 1.0.2e
openssl openssl 1.0.2f
openssl openssl 1.0.2g
openssl openssl 1.0.2h
openssl openssl 1.0.2i
openssl openssl 1.0.2j
openssl openssl 1.0.2k
openssl openssl 1.0.2l
openssl openssl 1.0.2m
openssl openssl 1.0.2n
openssl openssl 1.0.2o
openssl openssl 1.0.2p
openssl openssl 1.0.2q
openssl openssl 1.0.2r
openssl openssl 1.0.2s
openssl openssl 1.0.2t
openssl openssl 1.0.2u
openssl openssl 1.0.2v
openssl openssl 1.0.2w
openssl openssl 1.0.2x
openssl openssl 1.0.2y
openssl openssl 1.0.2za
openssl openssl 1.0.2zb
openssl openssl 1.0.2zc
openssl openssl 1.0.2zd
openssl openssl 1.0.2ze
openssl openssl 1.0.2zf
openssl openssl 1.0.2zg
openssl openssl 1.0.2zh
openssl openssl 1.1.1
openssl openssl 1.1.1
openssl openssl 1.1.1
openssl openssl 1.1.1
openssl openssl 1.1.1
openssl openssl 1.1.1
openssl openssl 1.1.1
openssl openssl 1.1.1
openssl openssl 1.1.1
openssl openssl 1.1.1
openssl openssl 1.1.1a
openssl openssl 1.1.1b
openssl openssl 1.1.1c
openssl openssl 1.1.1d
openssl openssl 1.1.1e
openssl openssl 1.1.1f
openssl openssl 1.1.1g
openssl openssl 1.1.1h
openssl openssl 1.1.1i
openssl openssl 1.1.1j
openssl openssl 1.1.1k
openssl openssl 1.1.1l
openssl openssl 1.1.1m
openssl openssl 1.1.1n
openssl openssl 1.1.1o
openssl openssl 1.1.1p
openssl openssl 1.1.1q
openssl openssl 1.1.1r
openssl openssl 1.1.1s
openssl openssl 1.1.1t
openssl openssl 1.1.1u



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:openssl:openssl:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "E327FF28-8035-4914-B7D9-F96780BD9C5E",
              "versionEndExcluding": "3.0.10",
              "versionStartIncluding": "3.0.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openssl:openssl:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "9BA338C8-1C98-4928-9661-BC82501A8972",
              "versionEndExcluding": "3.1.2",
              "versionStartIncluding": "3.1.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openssl:openssl:1.0.2:-:*:*:*:*:*:*",
              "matchCriteriaId": "CF0E6EB1-D656-458E-82B6-8C1ABDC13CB9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openssl:openssl:1.0.2:beta1:*:*:*:*:*:*",
              "matchCriteriaId": "18797BEE-417D-4959-9AAD-C5A7C051B524",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openssl:openssl:1.0.2:beta2:*:*:*:*:*:*",
              "matchCriteriaId": "6FAA3C31-BD9D-45A9-A502-837FECA6D479",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openssl:openssl:1.0.2:beta3:*:*:*:*:*:*",
              "matchCriteriaId": "6455A421-9956-4846-AC7C-3431E0D37D23",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openssl:openssl:1.0.2a:*:*:*:*:*:*:*",
              "matchCriteriaId": "60F946FD-F564-49DA-B043-5943308BA9EE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openssl:openssl:1.0.2b:*:*:*:*:*:*:*",
              "matchCriteriaId": "4847BCF3-EFCE-41AF-8E7D-3D51EB9DCC5B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openssl:openssl:1.0.2c:*:*:*:*:*:*:*",
              "matchCriteriaId": "9B89180B-FB68-4DD8-B076-16E51CC7FB91",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openssl:openssl:1.0.2d:*:*:*:*:*:*:*",
              "matchCriteriaId": "4C986592-4086-4A39-9767-EF34DBAA6A53",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openssl:openssl:1.0.2e:*:*:*:*:*:*:*",
              "matchCriteriaId": "7B23181C-03DB-4E92-B3F6-6B585B5231B4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openssl:openssl:1.0.2f:*:*:*:*:*:*:*",
              "matchCriteriaId": "94D9EC1C-4843-4026-9B05-E060E9391734",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openssl:openssl:1.0.2g:*:*:*:*:*:*:*",
              "matchCriteriaId": "B066401C-21CF-4BE9-9C55-C9F1E0C7BE3F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openssl:openssl:1.0.2h:*:*:*:*:*:*:*",
              "matchCriteriaId": "036FB24F-7D86-4730-8BC9-722875BEC807",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openssl:openssl:1.0.2i:*:*:*:*:*:*:*",
              "matchCriteriaId": "FDF148A3-1AA7-4F27-85AB-414C609C626F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openssl:openssl:1.0.2j:*:*:*:*:*:*:*",
              "matchCriteriaId": "E15B749E-6808-4788-AE42-7A1587D8697E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openssl:openssl:1.0.2k:*:*:*:*:*:*:*",
              "matchCriteriaId": "58F80C8D-BCA2-40AD-BD22-B70C7BE1B298",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openssl:openssl:1.0.2l:*:*:*:*:*:*:*",
              "matchCriteriaId": "70B78EDF-6BB7-42C4-9423-9332C62C6E43",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openssl:openssl:1.0.2m:*:*:*:*:*:*:*",
              "matchCriteriaId": "E2354F82-A01B-43D2-84F4-4E94B258E091",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openssl:openssl:1.0.2n:*:*:*:*:*:*:*",
              "matchCriteriaId": "59AAE340-19BC-4879-AC48-9F4F338A3B61",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openssl:openssl:1.0.2o:*:*:*:*:*:*:*",
              "matchCriteriaId": "6264EB97-9FBE-4DEB-A81D-EA0B2E4437FF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openssl:openssl:1.0.2p:*:*:*:*:*:*:*",
              "matchCriteriaId": "59B58D80-485A-4CBD-9220-D6FDBD6FEE65",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openssl:openssl:1.0.2q:*:*:*:*:*:*:*",
              "matchCriteriaId": "9B1131CC-526D-45FF-ABEB-164100D0BE0D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openssl:openssl:1.0.2r:*:*:*:*:*:*:*",
              "matchCriteriaId": "0739C502-4EDB-4D08-B2B9-04FAB98AFE02",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openssl:openssl:1.0.2s:*:*:*:*:*:*:*",
              "matchCriteriaId": "AB045D51-DAD7-44E1-BA80-4C90F0F4335F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openssl:openssl:1.0.2t:*:*:*:*:*:*:*",
              "matchCriteriaId": "5A745BE4-2249-4251-8AD1-43F0F7EF2755",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openssl:openssl:1.0.2u:*:*:*:*:*:*:*",
              "matchCriteriaId": "DAEB85A6-B9F9-4EC1-942F-7E17A3854600",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openssl:openssl:1.0.2v:*:*:*:*:*:*:*",
              "matchCriteriaId": "7D6D42CF-82FC-4A6F-9C4C-6DBF9470CABB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openssl:openssl:1.0.2w:*:*:*:*:*:*:*",
              "matchCriteriaId": "A6029EAB-8DDE-4995-AFC8-4C17BDEC8DFF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openssl:openssl:1.0.2x:*:*:*:*:*:*:*",
              "matchCriteriaId": "EF8EEF0A-623B-46A8-9C0D-F5EC490128DC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openssl:openssl:1.0.2y:*:*:*:*:*:*:*",
              "matchCriteriaId": "024263ED-A240-4447-8926-E9D1EF4792E7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openssl:openssl:1.0.2za:*:*:*:*:*:*:*",
              "matchCriteriaId": "EEAC4D67-2D2A-45EF-8693-1D90EEC818EC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openssl:openssl:1.0.2zb:*:*:*:*:*:*:*",
              "matchCriteriaId": "A6852B09-CC89-4F9C-8245-59AD2C797AC1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openssl:openssl:1.0.2zc:*:*:*:*:*:*:*",
              "matchCriteriaId": "3A7A844C-EB18-443B-8B33-86C98BFF683E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openssl:openssl:1.0.2zd:*:*:*:*:*:*:*",
              "matchCriteriaId": "8538CCF3-19C0-4E55-B5F7-AC07A1D68E2C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openssl:openssl:1.0.2ze:*:*:*:*:*:*:*",
              "matchCriteriaId": "3CCDDB86-9910-4251-91B0-D56EDE93BF49",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openssl:openssl:1.0.2zf:*:*:*:*:*:*:*",
              "matchCriteriaId": "96BA4105-67FF-43BD-A655-7F5741AD8F8F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openssl:openssl:1.0.2zg:*:*:*:*:*:*:*",
              "matchCriteriaId": "DC2EEB54-2A48-4DB7-B95C-4B5072B98858",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openssl:openssl:1.0.2zh:*:*:*:*:*:*:*",
              "matchCriteriaId": "A32F8FD2-79D4-4349-95EF-8B2448993CAF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openssl:openssl:1.1.1:-:*:*:*:*:*:*",
              "matchCriteriaId": "A8C84061-63BE-49F6-B2F0-D96847E755E0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openssl:openssl:1.1.1:pre1:*:*:*:*:*:*",
              "matchCriteriaId": "811DBBDB-4DD9-4440-A9EC-F97B161F1E1D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openssl:openssl:1.1.1:pre2:*:*:*:*:*:*",
              "matchCriteriaId": "8A5C2FE6-8BFB-4C73-83E9-0CF230D4B452",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openssl:openssl:1.1.1:pre3:*:*:*:*:*:*",
              "matchCriteriaId": "230480C2-314E-4465-B09D-101DCC475E7C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openssl:openssl:1.1.1:pre4:*:*:*:*:*:*",
              "matchCriteriaId": "5474A1A5-81F9-4B15-B145-C327EB098740",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openssl:openssl:1.1.1:pre5:*:*:*:*:*:*",
              "matchCriteriaId": "7EEDDD3D-0598-4F1F-93CB-FAF6757BFF1B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openssl:openssl:1.1.1:pre6:*:*:*:*:*:*",
              "matchCriteriaId": "ED226FB6-07FD-4713-BEFE-94456FA6F82F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openssl:openssl:1.1.1:pre7:*:*:*:*:*:*",
              "matchCriteriaId": "11AE7A76-811B-46D0-9173-BC5A48560F67",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openssl:openssl:1.1.1:pre8:*:*:*:*:*:*",
              "matchCriteriaId": "A4955261-CCEB-472B-9535-98B0CE04A321",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openssl:openssl:1.1.1:pre9:*:*:*:*:*:*",
              "matchCriteriaId": "C36FAE41-0B70-4049-9AFA-8F762EF4FB00",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openssl:openssl:1.1.1a:*:*:*:*:*:*:*",
              "matchCriteriaId": "42649AB8-1443-4036-9873-160D913BAD68",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openssl:openssl:1.1.1b:*:*:*:*:*:*:*",
              "matchCriteriaId": "8AE4A4BC-31BE-4EC5-907C-295D98484ABB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openssl:openssl:1.1.1c:*:*:*:*:*:*:*",
              "matchCriteriaId": "D8A852AB-AE4C-4794-BE45-D49EECA9D440",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openssl:openssl:1.1.1d:*:*:*:*:*:*:*",
              "matchCriteriaId": "6B34CE8C-FF32-433B-8527-CA04E7835AC5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openssl:openssl:1.1.1e:*:*:*:*:*:*:*",
              "matchCriteriaId": "F73E774D-C6EB-4776-A847-3F331EC77204",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openssl:openssl:1.1.1f:*:*:*:*:*:*:*",
              "matchCriteriaId": "BF6D1346-43CD-41DE-9021-A98157FED8B8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openssl:openssl:1.1.1g:*:*:*:*:*:*:*",
              "matchCriteriaId": "C7364FED-4719-4EF5-8ABB-D36CBD8BE402",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openssl:openssl:1.1.1h:*:*:*:*:*:*:*",
              "matchCriteriaId": "14479639-DF33-4AB7-B781-791BF8DA8382",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openssl:openssl:1.1.1i:*:*:*:*:*:*:*",
              "matchCriteriaId": "900C1008-F297-47FD-A1BD-11A3BEFF02E0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openssl:openssl:1.1.1j:*:*:*:*:*:*:*",
              "matchCriteriaId": "AD1A1441-D118-4557-A8AA-88B20D332ED5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openssl:openssl:1.1.1k:*:*:*:*:*:*:*",
              "matchCriteriaId": "8AACE259-34C9-4100-8730-5BDA4B1B1A66",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openssl:openssl:1.1.1l:*:*:*:*:*:*:*",
              "matchCriteriaId": "BAF15ABD-322D-413F-9707-C2A4508629D7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openssl:openssl:1.1.1m:*:*:*:*:*:*:*",
              "matchCriteriaId": "69FAF390-8141-4451-9D80-76155BD4EADC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openssl:openssl:1.1.1n:*:*:*:*:*:*:*",
              "matchCriteriaId": "0A54842A-332F-4092-ABE0-F3323541BE67",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openssl:openssl:1.1.1o:*:*:*:*:*:*:*",
              "matchCriteriaId": "FB72FEE3-190B-4326-ACD0-F52110536526",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openssl:openssl:1.1.1p:*:*:*:*:*:*:*",
              "matchCriteriaId": "1AF40BB0-0C57-4BCD-815F-A3FF4EB42D14",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openssl:openssl:1.1.1q:*:*:*:*:*:*:*",
              "matchCriteriaId": "EA111F81-1347-4D7D-BA0F-88350174DAFC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openssl:openssl:1.1.1r:*:*:*:*:*:*:*",
              "matchCriteriaId": "46E4334B-6203-49B1-83E6-381E6D12DCBA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openssl:openssl:1.1.1s:*:*:*:*:*:*:*",
              "matchCriteriaId": "B76E919B-5E08-4C04-80FF-5F9DBA244B71",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openssl:openssl:1.1.1t:*:*:*:*:*:*:*",
              "matchCriteriaId": "6F1DE6C9-DCAF-4896-912D-443A32B918F6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:openssl:openssl:1.1.1u:*:*:*:*:*:*:*",
              "matchCriteriaId": "C5C8A0C3-BAAF-43D7-B782-5EA17539D7EF",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Issue summary: Checking excessively long DH keys or parameters may be very slow.\n\nImpact summary: Applications that use the functions DH_check(), DH_check_ex()\nor EVP_PKEY_param_check() to check a DH key or DH parameters may experience long\ndelays. Where the key or parameters that are being checked have been obtained\nfrom an untrusted source this may lead to a Denial of Service.\n\nThe function DH_check() performs various checks on DH parameters. After fixing\nCVE-2023-3446 it was discovered that a large q parameter value can also trigger\nan overly long computation during some of these checks. A correct q value,\nif present, cannot be larger than the modulus p parameter, thus it is\nunnecessary to perform these checks if q is larger than p.\n\nAn application that calls DH_check() and supplies a key or parameters obtained\nfrom an untrusted source could be vulnerable to a Denial of Service attack.\n\nThe function DH_check() is itself called by a number of other OpenSSL functions.\nAn application calling any of those other functions may similarly be affected.\nThe other functions affected by this are DH_check_ex() and\nEVP_PKEY_param_check().\n\nAlso vulnerable are the OpenSSL dhparam and pkeyparam command line applications\nwhen using the \"-check\" option.\n\nThe OpenSSL SSL/TLS implementation is not affected by this issue.\n\nThe OpenSSL 3.0 and 3.1 FIPS providers are not affected by this issue."
    }
  ],
  "id": "CVE-2023-3817",
  "lastModified": "2024-11-21T08:18:08.167",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "LOW",
          "baseScore": 5.3,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
          "version": "3.1"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 1.4,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2023-07-31T16:15:10.497",
  "references": [
    {
      "source": "openssl-security@openssl.org",
      "tags": [
        "Mailing List",
        "Patch"
      ],
      "url": "https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=6a1eb62c29db6cb5eec707f9338aee00f44e26f5"
    },
    {
      "source": "openssl-security@openssl.org",
      "tags": [
        "Broken Link"
      ],
      "url": "https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=869ad69aadd985c7b8ca6f4e5dd0eb274c9f3644"
    },
    {
      "source": "openssl-security@openssl.org",
      "tags": [
        "Mailing List",
        "Patch"
      ],
      "url": "https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=9002fd07327a91f35ba6c1307e71fa6fd4409b7f"
    },
    {
      "source": "openssl-security@openssl.org",
      "tags": [
        "Mailing List",
        "Patch"
      ],
      "url": "https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=91ddeba0f2269b017dc06c46c993a788974b1aa5"
    },
    {
      "source": "openssl-security@openssl.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.openssl.org/news/secadv/20230731.txt"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://seclists.org/fulldisclosure/2023/Jul/43"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.openwall.com/lists/oss-security/2023/07/31/1"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.openwall.com/lists/oss-security/2023/09/22/11"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.openwall.com/lists/oss-security/2023/09/22/9"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.openwall.com/lists/oss-security/2023/11/06/2"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Mailing List",
        "Patch"
      ],
      "url": "https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=6a1eb62c29db6cb5eec707f9338aee00f44e26f5"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Broken Link"
      ],
      "url": "https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=869ad69aadd985c7b8ca6f4e5dd0eb274c9f3644"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Mailing List",
        "Patch"
      ],
      "url": "https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=9002fd07327a91f35ba6c1307e71fa6fd4409b7f"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Mailing List",
        "Patch"
      ],
      "url": "https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=91ddeba0f2269b017dc06c46c993a788974b1aa5"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://lists.debian.org/debian-lts-announce/2023/08/msg00019.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://security.gentoo.org/glsa/202402-08"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://security.netapp.com/advisory/ntap-20230818-0014/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://security.netapp.com/advisory/ntap-20231027-0008/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://security.netapp.com/advisory/ntap-20240621-0006/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.openssl.org/news/secadv/20230731.txt"
    }
  ],
  "sourceIdentifier": "openssl-security@openssl.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-606"
        }
      ],
      "source": "openssl-security@openssl.org",
      "type": "Secondary"
    },
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-834"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.