Логотип exploitDog
bind:"GHSA-hvc4-mjv4-5mw6" OR bind:"CVE-2023-6237"
Консоль
Логотип exploitDog

exploitDog

bind:"GHSA-hvc4-mjv4-5mw6" OR bind:"CVE-2023-6237"

Количество 12

Количество 12

github логотип

GHSA-hvc4-mjv4-5mw6

около 1 года назад

Issue summary: Checking excessively long invalid RSA public keys may take a long time. Impact summary: Applications that use the function EVP_PKEY_public_check() to check RSA public keys may experience long delays. Where the key that is being checked has been obtained from an untrusted source this may lead to a Denial of Service. When function EVP_PKEY_public_check() is called on RSA public keys, a computation is done to confirm that the RSA modulus, n, is composite. For valid RSA keys, n is a product of two or more large primes and this computation completes quickly. However, if n is an overly large prime, then this computation would take a long time. An application that calls EVP_PKEY_public_check() and supplies an RSA key obtained from an untrusted source could be vulnerable to a Denial of Service attack. The function EVP_PKEY_public_check() is not called from other OpenSSL functions however it is called from the OpenSSL pkey command line application. For that reason that app...

CVSS3: 5.9
EPSS: Низкий
ubuntu логотип

CVE-2023-6237

около 1 года назад

Issue summary: Checking excessively long invalid RSA public keys may take a long time. Impact summary: Applications that use the function EVP_PKEY_public_check() to check RSA public keys may experience long delays. Where the key that is being checked has been obtained from an untrusted source this may lead to a Denial of Service. When function EVP_PKEY_public_check() is called on RSA public keys, a computation is done to confirm that the RSA modulus, n, is composite. For valid RSA keys, n is a product of two or more large primes and this computation completes quickly. However, if n is an overly large prime, then this computation would take a long time. An application that calls EVP_PKEY_public_check() and supplies an RSA key obtained from an untrusted source could be vulnerable to a Denial of Service attack. The function EVP_PKEY_public_check() is not called from other OpenSSL functions however it is called from the OpenSSL pkey command line application. For that reason that applica...

CVSS3: 5.9
EPSS: Низкий
redhat логотип

CVE-2023-6237

больше 1 года назад

Issue summary: Checking excessively long invalid RSA public keys may take a long time. Impact summary: Applications that use the function EVP_PKEY_public_check() to check RSA public keys may experience long delays. Where the key that is being checked has been obtained from an untrusted source this may lead to a Denial of Service. When function EVP_PKEY_public_check() is called on RSA public keys, a computation is done to confirm that the RSA modulus, n, is composite. For valid RSA keys, n is a product of two or more large primes and this computation completes quickly. However, if n is an overly large prime, then this computation would take a long time. An application that calls EVP_PKEY_public_check() and supplies an RSA key obtained from an untrusted source could be vulnerable to a Denial of Service attack. The function EVP_PKEY_public_check() is not called from other OpenSSL functions however it is called from the OpenSSL pkey command line application. For that reason that applica...

CVSS3: 5.9
EPSS: Низкий
nvd логотип

CVE-2023-6237

около 1 года назад

Issue summary: Checking excessively long invalid RSA public keys may take a long time. Impact summary: Applications that use the function EVP_PKEY_public_check() to check RSA public keys may experience long delays. Where the key that is being checked has been obtained from an untrusted source this may lead to a Denial of Service. When function EVP_PKEY_public_check() is called on RSA public keys, a computation is done to confirm that the RSA modulus, n, is composite. For valid RSA keys, n is a product of two or more large primes and this computation completes quickly. However, if n is an overly large prime, then this computation would take a long time. An application that calls EVP_PKEY_public_check() and supplies an RSA key obtained from an untrusted source could be vulnerable to a Denial of Service attack. The function EVP_PKEY_public_check() is not called from other OpenSSL functions however it is called from the OpenSSL pkey command line application. For that reason that applic

CVSS3: 5.9
EPSS: Низкий
msrc логотип

CVE-2023-6237

8 месяцев назад

CVSS3: 5.9
EPSS: Низкий
debian логотип

CVE-2023-6237

около 1 года назад

Issue summary: Checking excessively long invalid RSA public keys may t ...

CVSS3: 5.9
EPSS: Низкий
fstec логотип

BDU:2024-01137

больше 1 года назад

Уязвимость функции EVP_PKEY_public_check() библиотеки OpenSSL, позволяющая нарушителю вызвать отказ в обслуживании (DoS)

CVSS3: 5.9
EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2024:0172-1

больше 1 года назад

Security update for openssl-3

EPSS: Низкий
redos логотип

ROS-20240503-11

около 1 года назад

Уязвимость openssl3

CVSS3: 5.9
EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2024:0518-1

больше 1 года назад

Security update for openssl-3

EPSS: Низкий
oracle-oval логотип

ELSA-2024-9088

7 месяцев назад

ELSA-2024-9088: edk2 security update (MODERATE)

EPSS: Низкий
oracle-oval логотип

ELSA-2024-2447

около 1 года назад

ELSA-2024-2447: openssl and openssl-fips-provider security update (LOW)

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
github логотип
GHSA-hvc4-mjv4-5mw6

Issue summary: Checking excessively long invalid RSA public keys may take a long time. Impact summary: Applications that use the function EVP_PKEY_public_check() to check RSA public keys may experience long delays. Where the key that is being checked has been obtained from an untrusted source this may lead to a Denial of Service. When function EVP_PKEY_public_check() is called on RSA public keys, a computation is done to confirm that the RSA modulus, n, is composite. For valid RSA keys, n is a product of two or more large primes and this computation completes quickly. However, if n is an overly large prime, then this computation would take a long time. An application that calls EVP_PKEY_public_check() and supplies an RSA key obtained from an untrusted source could be vulnerable to a Denial of Service attack. The function EVP_PKEY_public_check() is not called from other OpenSSL functions however it is called from the OpenSSL pkey command line application. For that reason that app...

CVSS3: 5.9
1%
Низкий
около 1 года назад
ubuntu логотип
CVE-2023-6237

Issue summary: Checking excessively long invalid RSA public keys may take a long time. Impact summary: Applications that use the function EVP_PKEY_public_check() to check RSA public keys may experience long delays. Where the key that is being checked has been obtained from an untrusted source this may lead to a Denial of Service. When function EVP_PKEY_public_check() is called on RSA public keys, a computation is done to confirm that the RSA modulus, n, is composite. For valid RSA keys, n is a product of two or more large primes and this computation completes quickly. However, if n is an overly large prime, then this computation would take a long time. An application that calls EVP_PKEY_public_check() and supplies an RSA key obtained from an untrusted source could be vulnerable to a Denial of Service attack. The function EVP_PKEY_public_check() is not called from other OpenSSL functions however it is called from the OpenSSL pkey command line application. For that reason that applica...

CVSS3: 5.9
1%
Низкий
около 1 года назад
redhat логотип
CVE-2023-6237

Issue summary: Checking excessively long invalid RSA public keys may take a long time. Impact summary: Applications that use the function EVP_PKEY_public_check() to check RSA public keys may experience long delays. Where the key that is being checked has been obtained from an untrusted source this may lead to a Denial of Service. When function EVP_PKEY_public_check() is called on RSA public keys, a computation is done to confirm that the RSA modulus, n, is composite. For valid RSA keys, n is a product of two or more large primes and this computation completes quickly. However, if n is an overly large prime, then this computation would take a long time. An application that calls EVP_PKEY_public_check() and supplies an RSA key obtained from an untrusted source could be vulnerable to a Denial of Service attack. The function EVP_PKEY_public_check() is not called from other OpenSSL functions however it is called from the OpenSSL pkey command line application. For that reason that applica...

CVSS3: 5.9
1%
Низкий
больше 1 года назад
nvd логотип
CVE-2023-6237

Issue summary: Checking excessively long invalid RSA public keys may take a long time. Impact summary: Applications that use the function EVP_PKEY_public_check() to check RSA public keys may experience long delays. Where the key that is being checked has been obtained from an untrusted source this may lead to a Denial of Service. When function EVP_PKEY_public_check() is called on RSA public keys, a computation is done to confirm that the RSA modulus, n, is composite. For valid RSA keys, n is a product of two or more large primes and this computation completes quickly. However, if n is an overly large prime, then this computation would take a long time. An application that calls EVP_PKEY_public_check() and supplies an RSA key obtained from an untrusted source could be vulnerable to a Denial of Service attack. The function EVP_PKEY_public_check() is not called from other OpenSSL functions however it is called from the OpenSSL pkey command line application. For that reason that applic

CVSS3: 5.9
1%
Низкий
около 1 года назад
msrc логотип
CVSS3: 5.9
1%
Низкий
8 месяцев назад
debian логотип
CVE-2023-6237

Issue summary: Checking excessively long invalid RSA public keys may t ...

CVSS3: 5.9
1%
Низкий
около 1 года назад
fstec логотип
BDU:2024-01137

Уязвимость функции EVP_PKEY_public_check() библиотеки OpenSSL, позволяющая нарушителю вызвать отказ в обслуживании (DoS)

CVSS3: 5.9
1%
Низкий
больше 1 года назад
suse-cvrf логотип
SUSE-SU-2024:0172-1

Security update for openssl-3

больше 1 года назад
redos логотип
ROS-20240503-11

Уязвимость openssl3

CVSS3: 5.9
1%
Низкий
около 1 года назад
suse-cvrf логотип
SUSE-SU-2024:0518-1

Security update for openssl-3

больше 1 года назад
oracle-oval логотип
ELSA-2024-9088

ELSA-2024-9088: edk2 security update (MODERATE)

7 месяцев назад
oracle-oval логотип
ELSA-2024-2447

ELSA-2024-2447: openssl and openssl-fips-provider security update (LOW)

около 1 года назад

Уязвимостей на страницу