Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2023-3446

Опубликовано: 19 июл. 2023
Источник: ubuntu
Приоритет: low
EPSS Низкий
CVSS3: 5.3

Описание

Issue summary: Checking excessively long DH keys or parameters may be very slow. Impact summary: Applications that use the functions DH_check(), DH_check_ex() or EVP_PKEY_param_check() to check a DH key or DH parameters may experience long delays. Where the key or parameters that are being checked have been obtained from an untrusted source this may lead to a Denial of Service. The function DH_check() performs various checks on DH parameters. One of those checks confirms that the modulus ('p' parameter) is not too large. Trying to use a very large modulus is slow and OpenSSL will not normally use a modulus which is over 10,000 bits in length. However the DH_check() function checks numerous aspects of the key or parameters that have been supplied. Some of those checks use the supplied modulus value even if it has already been found to be too large. An application that calls DH_check() and supplies a key or parameters obtained from an untrusted source could be vulernable to a Denial o...

РелизСтатусПримечание
bionic

ignored

end of standard support
devel

needed

esm-apps/bionic

needs-triage

esm-apps/xenial

needs-triage

esm-infra/focal

needed

focal

ignored

end of standard support, was needed
jammy

needed

kinetic

ignored

end of life, was needs-triage
lunar

ignored

end of life, was needs-triage
mantic

ignored

end of life, was needed

Показывать по

РелизСтатусПримечание
bionic

not-affected

uses system openssl1.0
devel

not-affected

uses system openssl
esm-apps/bionic

not-affected

uses system openssl1.0
esm-apps/focal

not-affected

uses system openssl
esm-apps/jammy

needed

esm-apps/noble

not-affected

uses system openssl
esm-apps/xenial

not-affected

uses system openssl
esm-infra-legacy/trusty

not-affected

uses system openssl
focal

not-affected

uses system openssl
jammy

needed

Показывать по

РелизСтатусПримечание
bionic

ignored

end of standard support
devel

not-affected

3.0.10-1ubuntu2
esm-infra-legacy/trusty

not-affected

1.0.1f-1ubuntu2.27+esm10
esm-infra/bionic

released

1.1.1-1ubuntu2.1~18.04.23+esm3
esm-infra/focal

not-affected

1.1.1f-1ubuntu2.20
esm-infra/xenial

released

1.0.2g-1ubuntu4.20+esm10
fips-preview/jammy

released

3.0.2-0ubuntu1.12+Fips1
fips-updates/bionic

released

1.1.1-1ubuntu2.fips.2.1~18.04.23.3
fips-updates/focal

released

1.1.1f-1ubuntu2.fips.20
fips-updates/jammy

released

3.0.2-0ubuntu1.12+Fips1

Показывать по

РелизСтатусПримечание
bionic

ignored

end of standard support
devel

DNE

esm-infra/bionic

released

1.0.2n-1ubuntu5.13+esm1
esm-infra/focal

DNE

focal

DNE

jammy

DNE

kinetic

DNE

lunar

DNE

mantic

DNE

noble

DNE

Показывать по

EPSS

Процентиль: 73%
0.00807
Низкий

5.3 Medium

CVSS3

Связанные уязвимости

CVSS3: 5.3
redhat
почти 2 года назад

Issue summary: Checking excessively long DH keys or parameters may be very slow. Impact summary: Applications that use the functions DH_check(), DH_check_ex() or EVP_PKEY_param_check() to check a DH key or DH parameters may experience long delays. Where the key or parameters that are being checked have been obtained from an untrusted source this may lead to a Denial of Service. The function DH_check() performs various checks on DH parameters. One of those checks confirms that the modulus ('p' parameter) is not too large. Trying to use a very large modulus is slow and OpenSSL will not normally use a modulus which is over 10,000 bits in length. However the DH_check() function checks numerous aspects of the key or parameters that have been supplied. Some of those checks use the supplied modulus value even if it has already been found to be too large. An application that calls DH_check() and supplies a key or parameters obtained from an untrusted source could be vulernable to a Denial o...

CVSS3: 5.3
nvd
почти 2 года назад

Issue summary: Checking excessively long DH keys or parameters may be very slow. Impact summary: Applications that use the functions DH_check(), DH_check_ex() or EVP_PKEY_param_check() to check a DH key or DH parameters may experience long delays. Where the key or parameters that are being checked have been obtained from an untrusted source this may lead to a Denial of Service. The function DH_check() performs various checks on DH parameters. One of those checks confirms that the modulus ('p' parameter) is not too large. Trying to use a very large modulus is slow and OpenSSL will not normally use a modulus which is over 10,000 bits in length. However the DH_check() function checks numerous aspects of the key or parameters that have been supplied. Some of those checks use the supplied modulus value even if it has already been found to be too large. An application that calls DH_check() and supplies a key or parameters obtained from an untrusted source could be vulernable to a Denial

CVSS3: 5.3
msrc
12 месяцев назад

Описание отсутствует

CVSS3: 5.3
debian
почти 2 года назад

Issue summary: Checking excessively long DH keys or parameters may be ...

suse-cvrf
почти 2 года назад

Security update for openssl

EPSS

Процентиль: 73%
0.00807
Низкий

5.3 Medium

CVSS3

Уязвимость CVE-2023-3446