5.3

CVE-2023-3817

Issue summary: Checking excessively long DH keys or parameters may be very slow.

Impact summary: Applications that use the functions DH_check(), DH_check_ex()
or EVP_PKEY_param_check() to check a DH key or DH parameters may experience long
delays. Where the key or parameters that are being checked have been obtained
from an untrusted source this may lead to a Denial of Service.

The function DH_check() performs various checks on DH parameters. After fixing
CVE-2023-3446 it was discovered that a large q parameter value can also trigger
an overly long computation during some of these checks. A correct q value,
if present, cannot be larger than the modulus p parameter, thus it is
unnecessary to perform these checks if q is larger than p.

An application that calls DH_check() and supplies a key or parameters obtained
from an untrusted source could be vulnerable to a Denial of Service attack.

The function DH_check() is itself called by a number of other OpenSSL functions.
An application calling any of those other functions may similarly be affected.
The other functions affected by this are DH_check_ex() and
EVP_PKEY_param_check().

Also vulnerable are the OpenSSL dhparam and pkeyparam command line applications
when using the "-check" option.

The OpenSSL SSL/TLS implementation is not affected by this issue.

The OpenSSL 3.0 and 3.1 FIPS providers are not affected by this issue.

Daten sind bereitgestellt durch National Vulnerability Database (NVD)
OpenSSLOpenSSL Version >= 3.0.0 < 3.0.10
OpenSSLOpenSSL Version >= 3.1.0 < 3.1.2
OpenSSLOpenSSL Version1.0.2 Update-
OpenSSLOpenSSL Version1.0.2 Updatebeta1
OpenSSLOpenSSL Version1.0.2 Updatebeta2
OpenSSLOpenSSL Version1.0.2 Updatebeta3
OpenSSLOpenSSL Version1.0.2a
OpenSSLOpenSSL Version1.0.2b
OpenSSLOpenSSL Version1.0.2c
OpenSSLOpenSSL Version1.0.2d
OpenSSLOpenSSL Version1.0.2e
OpenSSLOpenSSL Version1.0.2f
OpenSSLOpenSSL Version1.0.2g
OpenSSLOpenSSL Version1.0.2h
OpenSSLOpenSSL Version1.0.2i
OpenSSLOpenSSL Version1.0.2j
OpenSSLOpenSSL Version1.0.2k
OpenSSLOpenSSL Version1.0.2l
OpenSSLOpenSSL Version1.0.2m
OpenSSLOpenSSL Version1.0.2n
OpenSSLOpenSSL Version1.0.2o
OpenSSLOpenSSL Version1.0.2p
OpenSSLOpenSSL Version1.0.2q
OpenSSLOpenSSL Version1.0.2r
OpenSSLOpenSSL Version1.0.2s
OpenSSLOpenSSL Version1.0.2t
OpenSSLOpenSSL Version1.0.2u
OpenSSLOpenSSL Version1.0.2v
OpenSSLOpenSSL Version1.0.2w
OpenSSLOpenSSL Version1.0.2x
OpenSSLOpenSSL Version1.0.2y
OpenSSLOpenSSL Version1.0.2za
OpenSSLOpenSSL Version1.0.2zb
OpenSSLOpenSSL Version1.0.2zc
OpenSSLOpenSSL Version1.0.2zd
OpenSSLOpenSSL Version1.0.2ze
OpenSSLOpenSSL Version1.0.2zf
OpenSSLOpenSSL Version1.0.2zg
OpenSSLOpenSSL Version1.0.2zh
OpenSSLOpenSSL Version1.1.1 Update-
OpenSSLOpenSSL Version1.1.1 Updatepre1
OpenSSLOpenSSL Version1.1.1 Updatepre2
OpenSSLOpenSSL Version1.1.1 Updatepre3
OpenSSLOpenSSL Version1.1.1 Updatepre4
OpenSSLOpenSSL Version1.1.1 Updatepre5
OpenSSLOpenSSL Version1.1.1 Updatepre6
OpenSSLOpenSSL Version1.1.1 Updatepre7
OpenSSLOpenSSL Version1.1.1 Updatepre8
OpenSSLOpenSSL Version1.1.1 Updatepre9
OpenSSLOpenSSL Version1.1.1a
OpenSSLOpenSSL Version1.1.1b
OpenSSLOpenSSL Version1.1.1c
OpenSSLOpenSSL Version1.1.1d
OpenSSLOpenSSL Version1.1.1e
OpenSSLOpenSSL Version1.1.1f
OpenSSLOpenSSL Version1.1.1g
OpenSSLOpenSSL Version1.1.1h
OpenSSLOpenSSL Version1.1.1i
OpenSSLOpenSSL Version1.1.1j
OpenSSLOpenSSL Version1.1.1k
OpenSSLOpenSSL Version1.1.1l
OpenSSLOpenSSL Version1.1.1m
OpenSSLOpenSSL Version1.1.1n
OpenSSLOpenSSL Version1.1.1o
OpenSSLOpenSSL Version1.1.1p
OpenSSLOpenSSL Version1.1.1q
OpenSSLOpenSSL Version1.1.1r
OpenSSLOpenSSL Version1.1.1s
OpenSSLOpenSSL Version1.1.1t
OpenSSLOpenSSL Version1.1.1u
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 0.32% 0.546
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String
nvd@nist.gov 5.3 3.9 1.4
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
134c704f-9b21-4f2e-91b3-4a467353bcc0 5.3 3.9 1.4
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
CWE-606 Unchecked Input for Loop Condition

The product does not properly check inputs that are used for loop conditions, potentially leading to a denial of service or other consequences because of excessive looping.

CWE-834 Excessive Iteration

The product performs an iteration or loop without sufficiently limiting the number of times that the loop is executed.