Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2024-4603

Опубликовано: 16 мая 2024
Источник: ubuntu
Приоритет: low
EPSS Низкий
CVSS3: 5.3

Описание

Issue summary: Checking excessively long DSA keys or parameters may be very slow. Impact summary: Applications that use the functions EVP_PKEY_param_check() or EVP_PKEY_public_check() to check a DSA public key or DSA parameters may experience long delays. Where the key or parameters that are being checked have been obtained from an untrusted source this may lead to a Denial of Service. The functions EVP_PKEY_param_check() or EVP_PKEY_public_check() perform various checks on DSA parameters. Some of those computations take a long time if the modulus (p parameter) is too large. Trying to use a very large modulus is slow and OpenSSL will not allow using public keys with a modulus which is over 10,000 bits in length for signature verification. However the key and parameter check functions do not limit the modulus size when performing the checks. An application that calls EVP_PKEY_param_check() or EVP_PKEY_public_check() and supplies a key or parameters obtained from an untrusted source...

РелизСтатусПримечание
devel

needed

esm-apps/bionic

not-affected

openssl 3.x only
esm-apps/xenial

not-affected

openssl 3.x only
esm-infra/focal

not-affected

openssl 3.x only
focal

not-affected

openssl 3.x only
jammy

not-affected

openssl 3.x only
mantic

not-affected

openssl 3.x only
noble

needed

oracular

needed

plucky

needed

Показывать по

РелизСтатусПримечание
devel

not-affected

uses system openssl
esm-apps/bionic

needs-triage

esm-apps/focal

not-affected

uses system openssl
esm-apps/jammy

needs-triage

esm-apps/noble

not-affected

uses system openssl
esm-apps/xenial

needs-triage

esm-infra-legacy/trusty

not-affected

uses system openssl
focal

not-affected

uses system openssl
jammy

needed

mantic

not-affected

uses system openssl

Показывать по

РелизСтатусПримечание
devel

released

3.2.2-1ubuntu1
esm-infra-legacy/trusty

not-affected

3.x only
esm-infra/bionic

not-affected

3.x only
esm-infra/focal

not-affected

3.x only
esm-infra/xenial

not-affected

3.x only
fips-preview/jammy

needed

fips-updates/bionic

not-affected

3.x only
fips-updates/focal

not-affected

3.x only
fips-updates/jammy

released

3.0.2-0ubuntu1.17+Fips1
fips-updates/xenial

not-affected

3.x only

Показывать по

РелизСтатусПримечание
devel

DNE

esm-infra/bionic

not-affected

3.x only
esm-infra/focal

DNE

focal

DNE

jammy

DNE

mantic

DNE

noble

DNE

oracular

DNE

plucky

DNE

upstream

needs-triage

Показывать по

EPSS

Процентиль: 22%
0.00069
Низкий

5.3 Medium

CVSS3

Связанные уязвимости

CVSS3: 5.3
redhat
около 1 года назад

Issue summary: Checking excessively long DSA keys or parameters may be very slow. Impact summary: Applications that use the functions EVP_PKEY_param_check() or EVP_PKEY_public_check() to check a DSA public key or DSA parameters may experience long delays. Where the key or parameters that are being checked have been obtained from an untrusted source this may lead to a Denial of Service. The functions EVP_PKEY_param_check() or EVP_PKEY_public_check() perform various checks on DSA parameters. Some of those computations take a long time if the modulus (`p` parameter) is too large. Trying to use a very large modulus is slow and OpenSSL will not allow using public keys with a modulus which is over 10,000 bits in length for signature verification. However the key and parameter check functions do not limit the modulus size when performing the checks. An application that calls EVP_PKEY_param_check() or EVP_PKEY_public_check() and supplies a key or parameters obtained from an untrusted source...

CVSS3: 5.3
nvd
около 1 года назад

Issue summary: Checking excessively long DSA keys or parameters may be very slow. Impact summary: Applications that use the functions EVP_PKEY_param_check() or EVP_PKEY_public_check() to check a DSA public key or DSA parameters may experience long delays. Where the key or parameters that are being checked have been obtained from an untrusted source this may lead to a Denial of Service. The functions EVP_PKEY_param_check() or EVP_PKEY_public_check() perform various checks on DSA parameters. Some of those computations take a long time if the modulus (`p` parameter) is too large. Trying to use a very large modulus is slow and OpenSSL will not allow using public keys with a modulus which is over 10,000 bits in length for signature verification. However the key and parameter check functions do not limit the modulus size when performing the checks. An application that calls EVP_PKEY_param_check() or EVP_PKEY_public_check() and supplies a key or parameters obtained from an untrusted sourc

CVSS3: 5.3
msrc
9 месяцев назад

Описание отсутствует

CVSS3: 5.3
debian
около 1 года назад

Issue summary: Checking excessively long DSA keys or parameters may be ...

suse-cvrf
около 1 года назад

Security update for openssl-3

EPSS

Процентиль: 22%
0.00069
Низкий

5.3 Medium

CVSS3

Уязвимость CVE-2024-4603