Логотип exploitDog
bind:"BDU:2023-04960" OR bind:"CVE-2023-3817"
Консоль
Логотип exploitDog

exploitDog

bind:"BDU:2023-04960" OR bind:"CVE-2023-3817"

Количество 24

Количество 24

fstec логотип

BDU:2023-04960

почти 2 года назад

Уязвимость функций DH_check(), DH_check_ex(), EVP_PKEY_param_check() библиотеки OpenSSL, позволяющая нарушителю вызвать отказ в обслуживании

CVSS3: 5.3
EPSS: Низкий
redos логотип

ROS-20230907-04

почти 2 года назад

Множественные уязвимости openSSL

CVSS3: 5.3
EPSS: Низкий
redos логотип

ROS-20230929-01

больше 1 года назад

Множественные уязвимости Puppet

CVSS3: 7.5
EPSS: Низкий
ubuntu логотип

CVE-2023-3817

почти 2 года назад

Issue summary: Checking excessively long DH keys or parameters may be very slow. Impact summary: Applications that use the functions DH_check(), DH_check_ex() or EVP_PKEY_param_check() to check a DH key or DH parameters may experience long delays. Where the key or parameters that are being checked have been obtained from an untrusted source this may lead to a Denial of Service. The function DH_check() performs various checks on DH parameters. After fixing CVE-2023-3446 it was discovered that a large q parameter value can also trigger an overly long computation during some of these checks. A correct q value, if present, cannot be larger than the modulus p parameter, thus it is unnecessary to perform these checks if q is larger than p. An application that calls DH_check() and supplies a key or parameters obtained from an untrusted source could be vulnerable to a Denial of Service attack. The function DH_check() is itself called by a number of other OpenSSL functions. An application ca...

CVSS3: 5.3
EPSS: Низкий
redhat логотип

CVE-2023-3817

почти 2 года назад

Issue summary: Checking excessively long DH keys or parameters may be very slow. Impact summary: Applications that use the functions DH_check(), DH_check_ex() or EVP_PKEY_param_check() to check a DH key or DH parameters may experience long delays. Where the key or parameters that are being checked have been obtained from an untrusted source this may lead to a Denial of Service. The function DH_check() performs various checks on DH parameters. After fixing CVE-2023-3446 it was discovered that a large q parameter value can also trigger an overly long computation during some of these checks. A correct q value, if present, cannot be larger than the modulus p parameter, thus it is unnecessary to perform these checks if q is larger than p. An application that calls DH_check() and supplies a key or parameters obtained from an untrusted source could be vulnerable to a Denial of Service attack. The function DH_check() is itself called by a number of other OpenSSL functions. An application ca...

CVSS3: 5.3
EPSS: Низкий
nvd логотип

CVE-2023-3817

почти 2 года назад

Issue summary: Checking excessively long DH keys or parameters may be very slow. Impact summary: Applications that use the functions DH_check(), DH_check_ex() or EVP_PKEY_param_check() to check a DH key or DH parameters may experience long delays. Where the key or parameters that are being checked have been obtained from an untrusted source this may lead to a Denial of Service. The function DH_check() performs various checks on DH parameters. After fixing CVE-2023-3446 it was discovered that a large q parameter value can also trigger an overly long computation during some of these checks. A correct q value, if present, cannot be larger than the modulus p parameter, thus it is unnecessary to perform these checks if q is larger than p. An application that calls DH_check() and supplies a key or parameters obtained from an untrusted source could be vulnerable to a Denial of Service attack. The function DH_check() is itself called by a number of other OpenSSL functions. An application c

CVSS3: 5.3
EPSS: Низкий
msrc логотип

CVE-2023-3817

почти 2 года назад

CVSS3: 5.3
EPSS: Низкий
debian логотип

CVE-2023-3817

почти 2 года назад

Issue summary: Checking excessively long DH keys or parameters may be ...

CVSS3: 5.3
EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2023:3958-1

больше 1 года назад

Security update for openssl-1_1

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2023:3397-1

почти 2 года назад

Security update for openssl-1_1

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2023:3339-1

почти 2 года назад

Security update for openssl-1_0_0

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2023:3338-1

почти 2 года назад

Security update for openssl-1_0_0

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2023:3308-1

почти 2 года назад

Security update for openssl-1_0_0

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2023:3291-2

больше 1 года назад

Security update for openssl-1_1

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2023:3244-1

почти 2 года назад

Security update for openssl-3

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2023:3243-1

почти 2 года назад

Security update for openssl-3

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2023:3242-1

почти 2 года назад

Security update for openssl-1_1

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2023:3239-1

почти 2 года назад

Security update for openssl-1_1

EPSS: Низкий
github логотип

GHSA-c945-cqj5-wfv6

почти 2 года назад

Issue summary: Checking excessively long DH keys or parameters may be very slow. Impact summary: Applications that use the functions DH_check(), DH_check_ex() or EVP_PKEY_param_check() to check a DH key or DH parameters may experience long delays. Where the key or parameters that are being checked have been obtained from an untrusted source this may lead to a Denial of Service. The function DH_check() performs various checks on DH parameters. After fixing CVE-2023-3446 it was discovered that a large q parameter value can also trigger an overly long computation during some of these checks. A correct q value, if present, cannot be larger than the modulus p parameter, thus it is unnecessary to perform these checks if q is larger than p. An application that calls DH_check() and supplies a key or parameters obtained from an untrusted source could be vulnerable to a Denial of Service attack. The function DH_check() is itself called by a number of other OpenSSL functions. An applicatio...

CVSS3: 5.3
EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2023:4190-1

больше 1 года назад

Security update for openssl-3

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
fstec логотип
BDU:2023-04960

Уязвимость функций DH_check(), DH_check_ex(), EVP_PKEY_param_check() библиотеки OpenSSL, позволяющая нарушителю вызвать отказ в обслуживании

CVSS3: 5.3
0%
Низкий
почти 2 года назад
redos логотип
ROS-20230907-04

Множественные уязвимости openSSL

CVSS3: 5.3
почти 2 года назад
redos логотип
ROS-20230929-01

Множественные уязвимости Puppet

CVSS3: 7.5
больше 1 года назад
ubuntu логотип
CVE-2023-3817

Issue summary: Checking excessively long DH keys or parameters may be very slow. Impact summary: Applications that use the functions DH_check(), DH_check_ex() or EVP_PKEY_param_check() to check a DH key or DH parameters may experience long delays. Where the key or parameters that are being checked have been obtained from an untrusted source this may lead to a Denial of Service. The function DH_check() performs various checks on DH parameters. After fixing CVE-2023-3446 it was discovered that a large q parameter value can also trigger an overly long computation during some of these checks. A correct q value, if present, cannot be larger than the modulus p parameter, thus it is unnecessary to perform these checks if q is larger than p. An application that calls DH_check() and supplies a key or parameters obtained from an untrusted source could be vulnerable to a Denial of Service attack. The function DH_check() is itself called by a number of other OpenSSL functions. An application ca...

CVSS3: 5.3
0%
Низкий
почти 2 года назад
redhat логотип
CVE-2023-3817

Issue summary: Checking excessively long DH keys or parameters may be very slow. Impact summary: Applications that use the functions DH_check(), DH_check_ex() or EVP_PKEY_param_check() to check a DH key or DH parameters may experience long delays. Where the key or parameters that are being checked have been obtained from an untrusted source this may lead to a Denial of Service. The function DH_check() performs various checks on DH parameters. After fixing CVE-2023-3446 it was discovered that a large q parameter value can also trigger an overly long computation during some of these checks. A correct q value, if present, cannot be larger than the modulus p parameter, thus it is unnecessary to perform these checks if q is larger than p. An application that calls DH_check() and supplies a key or parameters obtained from an untrusted source could be vulnerable to a Denial of Service attack. The function DH_check() is itself called by a number of other OpenSSL functions. An application ca...

CVSS3: 5.3
0%
Низкий
почти 2 года назад
nvd логотип
CVE-2023-3817

Issue summary: Checking excessively long DH keys or parameters may be very slow. Impact summary: Applications that use the functions DH_check(), DH_check_ex() or EVP_PKEY_param_check() to check a DH key or DH parameters may experience long delays. Where the key or parameters that are being checked have been obtained from an untrusted source this may lead to a Denial of Service. The function DH_check() performs various checks on DH parameters. After fixing CVE-2023-3446 it was discovered that a large q parameter value can also trigger an overly long computation during some of these checks. A correct q value, if present, cannot be larger than the modulus p parameter, thus it is unnecessary to perform these checks if q is larger than p. An application that calls DH_check() and supplies a key or parameters obtained from an untrusted source could be vulnerable to a Denial of Service attack. The function DH_check() is itself called by a number of other OpenSSL functions. An application c

CVSS3: 5.3
0%
Низкий
почти 2 года назад
msrc логотип
CVSS3: 5.3
0%
Низкий
почти 2 года назад
debian логотип
CVE-2023-3817

Issue summary: Checking excessively long DH keys or parameters may be ...

CVSS3: 5.3
0%
Низкий
почти 2 года назад
suse-cvrf логотип
SUSE-SU-2023:3958-1

Security update for openssl-1_1

0%
Низкий
больше 1 года назад
suse-cvrf логотип
SUSE-SU-2023:3397-1

Security update for openssl-1_1

0%
Низкий
почти 2 года назад
suse-cvrf логотип
SUSE-SU-2023:3339-1

Security update for openssl-1_0_0

0%
Низкий
почти 2 года назад
suse-cvrf логотип
SUSE-SU-2023:3338-1

Security update for openssl-1_0_0

0%
Низкий
почти 2 года назад
suse-cvrf логотип
SUSE-SU-2023:3308-1

Security update for openssl-1_0_0

0%
Низкий
почти 2 года назад
suse-cvrf логотип
SUSE-SU-2023:3291-2

Security update for openssl-1_1

0%
Низкий
больше 1 года назад
suse-cvrf логотип
SUSE-SU-2023:3244-1

Security update for openssl-3

0%
Низкий
почти 2 года назад
suse-cvrf логотип
SUSE-SU-2023:3243-1

Security update for openssl-3

0%
Низкий
почти 2 года назад
suse-cvrf логотип
SUSE-SU-2023:3242-1

Security update for openssl-1_1

0%
Низкий
почти 2 года назад
suse-cvrf логотип
SUSE-SU-2023:3239-1

Security update for openssl-1_1

0%
Низкий
почти 2 года назад
github логотип
GHSA-c945-cqj5-wfv6

Issue summary: Checking excessively long DH keys or parameters may be very slow. Impact summary: Applications that use the functions DH_check(), DH_check_ex() or EVP_PKEY_param_check() to check a DH key or DH parameters may experience long delays. Where the key or parameters that are being checked have been obtained from an untrusted source this may lead to a Denial of Service. The function DH_check() performs various checks on DH parameters. After fixing CVE-2023-3446 it was discovered that a large q parameter value can also trigger an overly long computation during some of these checks. A correct q value, if present, cannot be larger than the modulus p parameter, thus it is unnecessary to perform these checks if q is larger than p. An application that calls DH_check() and supplies a key or parameters obtained from an untrusted source could be vulnerable to a Denial of Service attack. The function DH_check() is itself called by a number of other OpenSSL functions. An applicatio...

CVSS3: 5.3
0%
Низкий
почти 2 года назад
suse-cvrf логотип
SUSE-SU-2023:4190-1

Security update for openssl-3

больше 1 года назад

Уязвимостей на страницу