Логотип exploitDog
bind:CVE-2024-4603
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2024-4603

Количество 13

Количество 13

ubuntu логотип

CVE-2024-4603

больше 1 года назад

Issue summary: Checking excessively long DSA keys or parameters may be very slow. Impact summary: Applications that use the functions EVP_PKEY_param_check() or EVP_PKEY_public_check() to check a DSA public key or DSA parameters may experience long delays. Where the key or parameters that are being checked have been obtained from an untrusted source this may lead to a Denial of Service. The functions EVP_PKEY_param_check() or EVP_PKEY_public_check() perform various checks on DSA parameters. Some of those computations take a long time if the modulus (`p` parameter) is too large. Trying to use a very large modulus is slow and OpenSSL will not allow using public keys with a modulus which is over 10,000 bits in length for signature verification. However the key and parameter check functions do not limit the modulus size when performing the checks. An application that calls EVP_PKEY_param_check() or EVP_PKEY_public_check() and supplies a key or parameters obtained from an untrusted source...

CVSS3: 5.3
EPSS: Низкий
redhat логотип

CVE-2024-4603

больше 1 года назад

Issue summary: Checking excessively long DSA keys or parameters may be very slow. Impact summary: Applications that use the functions EVP_PKEY_param_check() or EVP_PKEY_public_check() to check a DSA public key or DSA parameters may experience long delays. Where the key or parameters that are being checked have been obtained from an untrusted source this may lead to a Denial of Service. The functions EVP_PKEY_param_check() or EVP_PKEY_public_check() perform various checks on DSA parameters. Some of those computations take a long time if the modulus (`p` parameter) is too large. Trying to use a very large modulus is slow and OpenSSL will not allow using public keys with a modulus which is over 10,000 bits in length for signature verification. However the key and parameter check functions do not limit the modulus size when performing the checks. An application that calls EVP_PKEY_param_check() or EVP_PKEY_public_check() and supplies a key or parameters obtained from an untrusted source...

CVSS3: 5.3
EPSS: Низкий
nvd логотип

CVE-2024-4603

больше 1 года назад

Issue summary: Checking excessively long DSA keys or parameters may be very slow. Impact summary: Applications that use the functions EVP_PKEY_param_check() or EVP_PKEY_public_check() to check a DSA public key or DSA parameters may experience long delays. Where the key or parameters that are being checked have been obtained from an untrusted source this may lead to a Denial of Service. The functions EVP_PKEY_param_check() or EVP_PKEY_public_check() perform various checks on DSA parameters. Some of those computations take a long time if the modulus (`p` parameter) is too large. Trying to use a very large modulus is slow and OpenSSL will not allow using public keys with a modulus which is over 10,000 bits in length for signature verification. However the key and parameter check functions do not limit the modulus size when performing the checks. An application that calls EVP_PKEY_param_check() or EVP_PKEY_public_check() and supplies a key or parameters obtained from an untrusted sourc

CVSS3: 5.3
EPSS: Низкий
msrc логотип

CVE-2024-4603

около 1 года назад

CVSS3: 5.3
EPSS: Низкий
debian логотип

CVE-2024-4603

больше 1 года назад

Issue summary: Checking excessively long DSA keys or parameters may be ...

CVSS3: 5.3
EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2024:1789-1

больше 1 года назад

Security update for openssl-3

EPSS: Низкий
redos логотип

ROS-20240606-10

больше 1 года назад

Уязвимость openssl3

CVSS3: 5.3
EPSS: Низкий
github логотип

GHSA-85xr-ghj6-6m46

больше 1 года назад

Issue summary: Checking excessively long DSA keys or parameters may be very slow. Impact summary: Applications that use the functions EVP_PKEY_param_check() or EVP_PKEY_public_check() to check a DSA public key or DSA parameters may experience long delays. Where the key or parameters that are being checked have been obtained from an untrusted source this may lead to a Denial of Service. The functions EVP_PKEY_param_check() or EVP_PKEY_public_check() perform various checks on DSA parameters. Some of those computations take a long time if the modulus (`p` parameter) is too large. Trying to use a very large modulus is slow and OpenSSL will not allow using public keys with a modulus which is over 10,000 bits in length for signature verification. However the key and parameter check functions do not limit the modulus size when performing the checks. An application that calls EVP_PKEY_param_check() or EVP_PKEY_public_check() and supplies a key or parameters obtained from an untrusted so...

CVSS3: 5.3
EPSS: Низкий
fstec логотип

BDU:2024-04423

больше 1 года назад

Уязвимость функций EVP_PKEY_param_check() и EVP_PKEY_public_check() криптографической библиотеки OpenSSL, позволяющая нарушителю вызвать отказ в обслуживании

CVSS3: 5.3
EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2024:2066-1

больше 1 года назад

Security update for openssl-3

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2024:1947-1

больше 1 года назад

Security update for openssl-3

EPSS: Низкий
rocky логотип

RLSA-2024:9333

8 месяцев назад

Low: openssl and openssl-fips-provider security update

EPSS: Низкий
oracle-oval логотип

ELSA-2024-9333

12 месяцев назад

ELSA-2024-9333: openssl and openssl-fips-provider security update (LOW)

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
ubuntu логотип
CVE-2024-4603

Issue summary: Checking excessively long DSA keys or parameters may be very slow. Impact summary: Applications that use the functions EVP_PKEY_param_check() or EVP_PKEY_public_check() to check a DSA public key or DSA parameters may experience long delays. Where the key or parameters that are being checked have been obtained from an untrusted source this may lead to a Denial of Service. The functions EVP_PKEY_param_check() or EVP_PKEY_public_check() perform various checks on DSA parameters. Some of those computations take a long time if the modulus (`p` parameter) is too large. Trying to use a very large modulus is slow and OpenSSL will not allow using public keys with a modulus which is over 10,000 bits in length for signature verification. However the key and parameter check functions do not limit the modulus size when performing the checks. An application that calls EVP_PKEY_param_check() or EVP_PKEY_public_check() and supplies a key or parameters obtained from an untrusted source...

CVSS3: 5.3
0%
Низкий
больше 1 года назад
redhat логотип
CVE-2024-4603

Issue summary: Checking excessively long DSA keys or parameters may be very slow. Impact summary: Applications that use the functions EVP_PKEY_param_check() or EVP_PKEY_public_check() to check a DSA public key or DSA parameters may experience long delays. Where the key or parameters that are being checked have been obtained from an untrusted source this may lead to a Denial of Service. The functions EVP_PKEY_param_check() or EVP_PKEY_public_check() perform various checks on DSA parameters. Some of those computations take a long time if the modulus (`p` parameter) is too large. Trying to use a very large modulus is slow and OpenSSL will not allow using public keys with a modulus which is over 10,000 bits in length for signature verification. However the key and parameter check functions do not limit the modulus size when performing the checks. An application that calls EVP_PKEY_param_check() or EVP_PKEY_public_check() and supplies a key or parameters obtained from an untrusted source...

CVSS3: 5.3
0%
Низкий
больше 1 года назад
nvd логотип
CVE-2024-4603

Issue summary: Checking excessively long DSA keys or parameters may be very slow. Impact summary: Applications that use the functions EVP_PKEY_param_check() or EVP_PKEY_public_check() to check a DSA public key or DSA parameters may experience long delays. Where the key or parameters that are being checked have been obtained from an untrusted source this may lead to a Denial of Service. The functions EVP_PKEY_param_check() or EVP_PKEY_public_check() perform various checks on DSA parameters. Some of those computations take a long time if the modulus (`p` parameter) is too large. Trying to use a very large modulus is slow and OpenSSL will not allow using public keys with a modulus which is over 10,000 bits in length for signature verification. However the key and parameter check functions do not limit the modulus size when performing the checks. An application that calls EVP_PKEY_param_check() or EVP_PKEY_public_check() and supplies a key or parameters obtained from an untrusted sourc

CVSS3: 5.3
0%
Низкий
больше 1 года назад
msrc логотип
CVSS3: 5.3
0%
Низкий
около 1 года назад
debian логотип
CVE-2024-4603

Issue summary: Checking excessively long DSA keys or parameters may be ...

CVSS3: 5.3
0%
Низкий
больше 1 года назад
suse-cvrf логотип
SUSE-SU-2024:1789-1

Security update for openssl-3

0%
Низкий
больше 1 года назад
redos логотип
ROS-20240606-10

Уязвимость openssl3

CVSS3: 5.3
0%
Низкий
больше 1 года назад
github логотип
GHSA-85xr-ghj6-6m46

Issue summary: Checking excessively long DSA keys or parameters may be very slow. Impact summary: Applications that use the functions EVP_PKEY_param_check() or EVP_PKEY_public_check() to check a DSA public key or DSA parameters may experience long delays. Where the key or parameters that are being checked have been obtained from an untrusted source this may lead to a Denial of Service. The functions EVP_PKEY_param_check() or EVP_PKEY_public_check() perform various checks on DSA parameters. Some of those computations take a long time if the modulus (`p` parameter) is too large. Trying to use a very large modulus is slow and OpenSSL will not allow using public keys with a modulus which is over 10,000 bits in length for signature verification. However the key and parameter check functions do not limit the modulus size when performing the checks. An application that calls EVP_PKEY_param_check() or EVP_PKEY_public_check() and supplies a key or parameters obtained from an untrusted so...

CVSS3: 5.3
0%
Низкий
больше 1 года назад
fstec логотип
BDU:2024-04423

Уязвимость функций EVP_PKEY_param_check() и EVP_PKEY_public_check() криптографической библиотеки OpenSSL, позволяющая нарушителю вызвать отказ в обслуживании

CVSS3: 5.3
0%
Низкий
больше 1 года назад
suse-cvrf логотип
SUSE-SU-2024:2066-1

Security update for openssl-3

больше 1 года назад
suse-cvrf логотип
SUSE-SU-2024:1947-1

Security update for openssl-3

больше 1 года назад
rocky логотип
RLSA-2024:9333

Low: openssl and openssl-fips-provider security update

8 месяцев назад
oracle-oval логотип
ELSA-2024-9333

ELSA-2024-9333: openssl and openssl-fips-provider security update (LOW)

12 месяцев назад

Уязвимостей на страницу