Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2024-4603

Опубликовано: 16 мая 2024
Источник: ubuntu
Приоритет: low
EPSS Низкий
CVSS3: 5.3

Описание

Issue summary: Checking excessively long DSA keys or parameters may be very slow. Impact summary: Applications that use the functions EVP_PKEY_param_check() or EVP_PKEY_public_check() to check a DSA public key or DSA parameters may experience long delays. Where the key or parameters that are being checked have been obtained from an untrusted source this may lead to a Denial of Service. The functions EVP_PKEY_param_check() or EVP_PKEY_public_check() perform various checks on DSA parameters. Some of those computations take a long time if the modulus (p parameter) is too large. Trying to use a very large modulus is slow and OpenSSL will not allow using public keys with a modulus which is over 10,000 bits in length for signature verification. However the key and parameter check functions do not limit the modulus size when performing the checks. An application that calls EVP_PKEY_param_check() or EVP_PKEY_public_check() and supplies a key or parameters obtained from an untrusted source...

РелизСтатусПримечание
devel

not-affected

2025.02-8ubuntu1
esm-apps/bionic

not-affected

openssl 3.x only
esm-apps/xenial

not-affected

openssl 3.x only
esm-infra/focal

not-affected

openssl 3.x only
focal

not-affected

openssl 3.x only
jammy

not-affected

openssl 3.x only
mantic

not-affected

openssl 3.x only
noble

not-affected

code not compiled
oracular

ignored

end of life, was needed
plucky

not-affected

2025.02-3ubuntu2.1

Показывать по

РелизСтатусПримечание
devel

not-affected

uses system openssl
esm-apps/bionic

needs-triage

esm-apps/focal

not-affected

uses system openssl
esm-apps/jammy

needs-triage

esm-apps/noble

not-affected

uses system openssl
esm-apps/xenial

needs-triage

esm-infra-legacy/trusty

not-affected

uses system openssl
focal

not-affected

uses system openssl
jammy

needed

mantic

not-affected

uses system openssl

Показывать по

РелизСтатусПримечание
devel

released

3.2.2-1ubuntu1
esm-infra-legacy/trusty

not-affected

3.x only
esm-infra/bionic

not-affected

3.x only
esm-infra/focal

not-affected

3.x only
esm-infra/xenial

not-affected

3.x only
fips-preview/jammy

needed

fips-updates/bionic

not-affected

3.x only
fips-updates/focal

not-affected

3.x only
fips-updates/jammy

released

3.0.2-0ubuntu1.17+Fips1
fips-updates/xenial

not-affected

3.x only

Показывать по

РелизСтатусПримечание
devel

DNE

esm-infra/bionic

not-affected

3.x only
esm-infra/focal

DNE

focal

DNE

jammy

DNE

mantic

DNE

noble

DNE

oracular

DNE

plucky

DNE

questing

DNE

Показывать по

EPSS

Процентиль: 27%
0.00092
Низкий

5.3 Medium

CVSS3

Связанные уязвимости

CVSS3: 5.3
redhat
больше 1 года назад

Issue summary: Checking excessively long DSA keys or parameters may be very slow. Impact summary: Applications that use the functions EVP_PKEY_param_check() or EVP_PKEY_public_check() to check a DSA public key or DSA parameters may experience long delays. Where the key or parameters that are being checked have been obtained from an untrusted source this may lead to a Denial of Service. The functions EVP_PKEY_param_check() or EVP_PKEY_public_check() perform various checks on DSA parameters. Some of those computations take a long time if the modulus (`p` parameter) is too large. Trying to use a very large modulus is slow and OpenSSL will not allow using public keys with a modulus which is over 10,000 bits in length for signature verification. However the key and parameter check functions do not limit the modulus size when performing the checks. An application that calls EVP_PKEY_param_check() or EVP_PKEY_public_check() and supplies a key or parameters obtained from an untrusted source...

CVSS3: 5.3
nvd
больше 1 года назад

Issue summary: Checking excessively long DSA keys or parameters may be very slow. Impact summary: Applications that use the functions EVP_PKEY_param_check() or EVP_PKEY_public_check() to check a DSA public key or DSA parameters may experience long delays. Where the key or parameters that are being checked have been obtained from an untrusted source this may lead to a Denial of Service. The functions EVP_PKEY_param_check() or EVP_PKEY_public_check() perform various checks on DSA parameters. Some of those computations take a long time if the modulus (`p` parameter) is too large. Trying to use a very large modulus is slow and OpenSSL will not allow using public keys with a modulus which is over 10,000 bits in length for signature verification. However the key and parameter check functions do not limit the modulus size when performing the checks. An application that calls EVP_PKEY_param_check() or EVP_PKEY_public_check() and supplies a key or parameters obtained from an untrusted sourc

CVSS3: 5.3
msrc
около 1 года назад

Описание отсутствует

CVSS3: 5.3
debian
больше 1 года назад

Issue summary: Checking excessively long DSA keys or parameters may be ...

suse-cvrf
больше 1 года назад

Security update for openssl-3

EPSS

Процентиль: 27%
0.00092
Низкий

5.3 Medium

CVSS3