Логотип exploitDog
bind:CVE-2024-41996
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2024-41996

Количество 12

Количество 12

ubuntu логотип

CVE-2024-41996

больше 1 года назад

Validating the order of the public keys in the Diffie-Hellman Key Agreement Protocol, when an approved safe prime is used, allows remote attackers (from the client side) to trigger unnecessarily expensive server-side DHE modular-exponentiation calculations. The client may cause asymmetric resource consumption. The basic attack scenario is that the client must claim that it can only communicate with DHE, and the server must be configured to allow DHE and validate the order of the public key.

CVSS3: 7.5
EPSS: Низкий
redhat логотип

CVE-2024-41996

больше 1 года назад

Validating the order of the public keys in the Diffie-Hellman Key Agreement Protocol, when an approved safe prime is used, allows remote attackers (from the client side) to trigger unnecessarily expensive server-side DHE modular-exponentiation calculations. The client may cause asymmetric resource consumption. The basic attack scenario is that the client must claim that it can only communicate with DHE, and the server must be configured to allow DHE and validate the order of the public key.

CVSS3: 5.9
EPSS: Низкий
nvd логотип

CVE-2024-41996

больше 1 года назад

Validating the order of the public keys in the Diffie-Hellman Key Agreement Protocol, when an approved safe prime is used, allows remote attackers (from the client side) to trigger unnecessarily expensive server-side DHE modular-exponentiation calculations. The client may cause asymmetric resource consumption. The basic attack scenario is that the client must claim that it can only communicate with DHE, and the server must be configured to allow DHE and validate the order of the public key.

CVSS3: 7.5
EPSS: Низкий
debian логотип

CVE-2024-41996

больше 1 года назад

Validating the order of the public keys in the Diffie-Hellman Key Agre ...

CVSS3: 7.5
EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2024:3525-1

больше 1 года назад

Security update for openssl-3

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2024:3501-1

больше 1 года назад

Security update for openssl-3

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2024:3500-1

больше 1 года назад

Security update for openssl-3

EPSS: Низкий
github логотип

GHSA-h964-f4gx-gw3x

больше 1 года назад

Validating the order of the public keys in the Diffie-Hellman Key Agreement Protocol, when an approved safe prime is used, allows remote attackers (from the client side) to trigger unnecessarily expensive server-side DHE modular-exponentiation calculations. The client may cause asymmetric resource consumption. The basic attack scenario is that the client must claim that it can only communicate with DHE, and the server must be configured to allow DHE and validate the order of the public key.

CVSS3: 7.5
EPSS: Низкий
fstec логотип

BDU:2025-11398

больше 1 года назад

Уязвимость реализации протокола согласования ключей Diffie-Hellman Key Agreement Protocol библиотеки OpenSSL, позволяющая нарушителю вызвать отказ в обслуживании

CVSS3: 7.5
EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2024:3871-1

около 1 года назад

Security update for openssl-3

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2024:3766-1

около 1 года назад

Security update for openssl-3

EPSS: Низкий
redos логотип

ROS-20250826-02

5 месяцев назад

Уязвимость openssl3

CVSS3: 7.5
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
ubuntu логотип
CVE-2024-41996

Validating the order of the public keys in the Diffie-Hellman Key Agreement Protocol, when an approved safe prime is used, allows remote attackers (from the client side) to trigger unnecessarily expensive server-side DHE modular-exponentiation calculations. The client may cause asymmetric resource consumption. The basic attack scenario is that the client must claim that it can only communicate with DHE, and the server must be configured to allow DHE and validate the order of the public key.

CVSS3: 7.5
1%
Низкий
больше 1 года назад
redhat логотип
CVE-2024-41996

Validating the order of the public keys in the Diffie-Hellman Key Agreement Protocol, when an approved safe prime is used, allows remote attackers (from the client side) to trigger unnecessarily expensive server-side DHE modular-exponentiation calculations. The client may cause asymmetric resource consumption. The basic attack scenario is that the client must claim that it can only communicate with DHE, and the server must be configured to allow DHE and validate the order of the public key.

CVSS3: 5.9
1%
Низкий
больше 1 года назад
nvd логотип
CVE-2024-41996

Validating the order of the public keys in the Diffie-Hellman Key Agreement Protocol, when an approved safe prime is used, allows remote attackers (from the client side) to trigger unnecessarily expensive server-side DHE modular-exponentiation calculations. The client may cause asymmetric resource consumption. The basic attack scenario is that the client must claim that it can only communicate with DHE, and the server must be configured to allow DHE and validate the order of the public key.

CVSS3: 7.5
1%
Низкий
больше 1 года назад
debian логотип
CVE-2024-41996

Validating the order of the public keys in the Diffie-Hellman Key Agre ...

CVSS3: 7.5
1%
Низкий
больше 1 года назад
suse-cvrf логотип
SUSE-SU-2024:3525-1

Security update for openssl-3

1%
Низкий
больше 1 года назад
suse-cvrf логотип
SUSE-SU-2024:3501-1

Security update for openssl-3

1%
Низкий
больше 1 года назад
suse-cvrf логотип
SUSE-SU-2024:3500-1

Security update for openssl-3

1%
Низкий
больше 1 года назад
github логотип
GHSA-h964-f4gx-gw3x

Validating the order of the public keys in the Diffie-Hellman Key Agreement Protocol, when an approved safe prime is used, allows remote attackers (from the client side) to trigger unnecessarily expensive server-side DHE modular-exponentiation calculations. The client may cause asymmetric resource consumption. The basic attack scenario is that the client must claim that it can only communicate with DHE, and the server must be configured to allow DHE and validate the order of the public key.

CVSS3: 7.5
1%
Низкий
больше 1 года назад
fstec логотип
BDU:2025-11398

Уязвимость реализации протокола согласования ключей Diffie-Hellman Key Agreement Protocol библиотеки OpenSSL, позволяющая нарушителю вызвать отказ в обслуживании

CVSS3: 7.5
1%
Низкий
больше 1 года назад
suse-cvrf логотип
SUSE-SU-2024:3871-1

Security update for openssl-3

около 1 года назад
suse-cvrf логотип
SUSE-SU-2024:3766-1

Security update for openssl-3

около 1 года назад
redos логотип
ROS-20250826-02

Уязвимость openssl3

CVSS3: 7.5
1%
Низкий
5 месяцев назад

Уязвимостей на страницу