Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2024-41996

Опубликовано: 26 авг. 2024
Источник: redhat
CVSS3: 5.9
EPSS Низкий

Описание

Validating the order of the public keys in the Diffie-Hellman Key Agreement Protocol, when an approved safe prime is used, allows remote attackers (from the client side) to trigger unnecessarily expensive server-side DHE modular-exponentiation calculations. The client may cause asymmetric resource consumption. The basic attack scenario is that the client must claim that it can only communicate with DHE, and the server must be configured to allow DHE and validate the order of the public key.

A vulnerability was found in the Diffie-Hellman Ephemeral (DHE) Key Agreement Protocol, where a malicious client can exploit the server's public key validation process. By forcing the server to use DHE and validating the order of public keys, the client can trigger expensive server-side modular exponentiation calculations. This issue results in asymmetric resource consumption, potentially leading to a denial of service (DoS) attack by overwhelming the server with computationally intensive operations.

Отчет

This vulnerability is classified with a Low severity rather than Moderate because it requires specific conditions to be exploitable. The attack depends on the server being configured to use DHE key exchange and perform public key order validation, which is not the default in many configurations. Additionally, while the attack can cause increased CPU usage, leading to a potential denial of service, it does not directly compromise the confidentiality, integrity, or availability of the data being exchanged. The impact is limited to resource exhaustion, and mitigations such as rate limiting, alternative key exchange methods, or disabling DHE can effectively reduce the attack surface, making it less impacted than issues that could lead to direct data breaches or system compromise.

Меры по смягчению последствий

Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Logging Subsystem for Red Hat OpenShiftopenshift-logging/fluentd-rhel8Will not fix
Red Hat 3scale API Management Platform 23scale-amp-backend-containerWill not fix
Red Hat Enterprise Linux 10opensslWill not fix
Red Hat Enterprise Linux 6opensslWill not fix
Red Hat Enterprise Linux 7opensslWill not fix
Red Hat Enterprise Linux 7ovmfWill not fix
Red Hat Enterprise Linux 8compat-openssl10Will not fix
Red Hat Enterprise Linux 8mingw-opensslWill not fix
Red Hat Enterprise Linux 8opensslWill not fix
Red Hat Enterprise Linux 9compat-openssl11Will not fix

Показывать по

Дополнительная информация

Статус:

Low
Дефект:
CWE-295
https://bugzilla.redhat.com/show_bug.cgi?id=2307826openssl: remote attackers (from the client side) to trigger unnecessarily expensive server-side DHE modular-exponentiation calculations

EPSS

Процентиль: 38%
0.00166
Низкий

5.9 Medium

CVSS3

Связанные уязвимости

CVSS3: 7.5
ubuntu
около 1 года назад

Validating the order of the public keys in the Diffie-Hellman Key Agreement Protocol, when an approved safe prime is used, allows remote attackers (from the client side) to trigger unnecessarily expensive server-side DHE modular-exponentiation calculations. The client may cause asymmetric resource consumption. The basic attack scenario is that the client must claim that it can only communicate with DHE, and the server must be configured to allow DHE and validate the order of the public key.

CVSS3: 7.5
nvd
около 1 года назад

Validating the order of the public keys in the Diffie-Hellman Key Agreement Protocol, when an approved safe prime is used, allows remote attackers (from the client side) to trigger unnecessarily expensive server-side DHE modular-exponentiation calculations. The client may cause asymmetric resource consumption. The basic attack scenario is that the client must claim that it can only communicate with DHE, and the server must be configured to allow DHE and validate the order of the public key.

CVSS3: 7.5
debian
около 1 года назад

Validating the order of the public keys in the Diffie-Hellman Key Agre ...

suse-cvrf
11 месяцев назад

Security update for openssl-3

suse-cvrf
11 месяцев назад

Security update for openssl-3

EPSS

Процентиль: 38%
0.00166
Низкий

5.9 Medium

CVSS3