Логотип exploitDog
bind: "CVE-2024-41996"
Консоль
Логотип exploitDog

exploitDog

bind: "CVE-2024-41996"

Количество 11

Количество 11

ubuntu логотип

CVE-2024-41996

около 1 года назад

Validating the order of the public keys in the Diffie-Hellman Key Agreement Protocol, when an approved safe prime is used, allows remote attackers (from the client side) to trigger unnecessarily expensive server-side DHE modular-exponentiation calculations. The client may cause asymmetric resource consumption. The basic attack scenario is that the client must claim that it can only communicate with DHE, and the server must be configured to allow DHE and validate the order of the public key.

CVSS3: 7.5
EPSS: Низкий
redhat логотип

CVE-2024-41996

около 1 года назад

Validating the order of the public keys in the Diffie-Hellman Key Agreement Protocol, when an approved safe prime is used, allows remote attackers (from the client side) to trigger unnecessarily expensive server-side DHE modular-exponentiation calculations. The client may cause asymmetric resource consumption. The basic attack scenario is that the client must claim that it can only communicate with DHE, and the server must be configured to allow DHE and validate the order of the public key.

CVSS3: 5.9
EPSS: Низкий
nvd логотип

CVE-2024-41996

около 1 года назад

Validating the order of the public keys in the Diffie-Hellman Key Agreement Protocol, when an approved safe prime is used, allows remote attackers (from the client side) to trigger unnecessarily expensive server-side DHE modular-exponentiation calculations. The client may cause asymmetric resource consumption. The basic attack scenario is that the client must claim that it can only communicate with DHE, and the server must be configured to allow DHE and validate the order of the public key.

CVSS3: 7.5
EPSS: Низкий
debian логотип

CVE-2024-41996

около 1 года назад

Validating the order of the public keys in the Diffie-Hellman Key Agre ...

CVSS3: 7.5
EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2024:3525-1

11 месяцев назад

Security update for openssl-3

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2024:3501-1

11 месяцев назад

Security update for openssl-3

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2024:3500-1

11 месяцев назад

Security update for openssl-3

EPSS: Низкий
redos логотип

ROS-20250826-02

9 дней назад

Уязвимость openssl3

CVSS3: 7.5
EPSS: Низкий
github логотип

GHSA-h964-f4gx-gw3x

около 1 года назад

Validating the order of the public keys in the Diffie-Hellman Key Agreement Protocol, when an approved safe prime is used, allows remote attackers (from the client side) to trigger unnecessarily expensive server-side DHE modular-exponentiation calculations. The client may cause asymmetric resource consumption. The basic attack scenario is that the client must claim that it can only communicate with DHE, and the server must be configured to allow DHE and validate the order of the public key.

CVSS3: 7.5
EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2024:3871-1

10 месяцев назад

Security update for openssl-3

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2024:3766-1

10 месяцев назад

Security update for openssl-3

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
ubuntu логотип
CVE-2024-41996

Validating the order of the public keys in the Diffie-Hellman Key Agreement Protocol, when an approved safe prime is used, allows remote attackers (from the client side) to trigger unnecessarily expensive server-side DHE modular-exponentiation calculations. The client may cause asymmetric resource consumption. The basic attack scenario is that the client must claim that it can only communicate with DHE, and the server must be configured to allow DHE and validate the order of the public key.

CVSS3: 7.5
0%
Низкий
около 1 года назад
redhat логотип
CVE-2024-41996

Validating the order of the public keys in the Diffie-Hellman Key Agreement Protocol, when an approved safe prime is used, allows remote attackers (from the client side) to trigger unnecessarily expensive server-side DHE modular-exponentiation calculations. The client may cause asymmetric resource consumption. The basic attack scenario is that the client must claim that it can only communicate with DHE, and the server must be configured to allow DHE and validate the order of the public key.

CVSS3: 5.9
0%
Низкий
около 1 года назад
nvd логотип
CVE-2024-41996

Validating the order of the public keys in the Diffie-Hellman Key Agreement Protocol, when an approved safe prime is used, allows remote attackers (from the client side) to trigger unnecessarily expensive server-side DHE modular-exponentiation calculations. The client may cause asymmetric resource consumption. The basic attack scenario is that the client must claim that it can only communicate with DHE, and the server must be configured to allow DHE and validate the order of the public key.

CVSS3: 7.5
0%
Низкий
около 1 года назад
debian логотип
CVE-2024-41996

Validating the order of the public keys in the Diffie-Hellman Key Agre ...

CVSS3: 7.5
0%
Низкий
около 1 года назад
suse-cvrf логотип
SUSE-SU-2024:3525-1

Security update for openssl-3

0%
Низкий
11 месяцев назад
suse-cvrf логотип
SUSE-SU-2024:3501-1

Security update for openssl-3

0%
Низкий
11 месяцев назад
suse-cvrf логотип
SUSE-SU-2024:3500-1

Security update for openssl-3

0%
Низкий
11 месяцев назад
redos логотип
ROS-20250826-02

Уязвимость openssl3

CVSS3: 7.5
0%
Низкий
9 дней назад
github логотип
GHSA-h964-f4gx-gw3x

Validating the order of the public keys in the Diffie-Hellman Key Agreement Protocol, when an approved safe prime is used, allows remote attackers (from the client side) to trigger unnecessarily expensive server-side DHE modular-exponentiation calculations. The client may cause asymmetric resource consumption. The basic attack scenario is that the client must claim that it can only communicate with DHE, and the server must be configured to allow DHE and validate the order of the public key.

CVSS3: 7.5
0%
Низкий
около 1 года назад
suse-cvrf логотип
SUSE-SU-2024:3871-1

Security update for openssl-3

10 месяцев назад
suse-cvrf логотип
SUSE-SU-2024:3766-1

Security update for openssl-3

10 месяцев назад

Уязвимостей на страницу