Количество 24
Количество 24

CVE-2023-3817
Issue summary: Checking excessively long DH keys or parameters may be very slow. Impact summary: Applications that use the functions DH_check(), DH_check_ex() or EVP_PKEY_param_check() to check a DH key or DH parameters may experience long delays. Where the key or parameters that are being checked have been obtained from an untrusted source this may lead to a Denial of Service. The function DH_check() performs various checks on DH parameters. After fixing CVE-2023-3446 it was discovered that a large q parameter value can also trigger an overly long computation during some of these checks. A correct q value, if present, cannot be larger than the modulus p parameter, thus it is unnecessary to perform these checks if q is larger than p. An application that calls DH_check() and supplies a key or parameters obtained from an untrusted source could be vulnerable to a Denial of Service attack. The function DH_check() is itself called by a number of other OpenSSL functions. An application ca...

CVE-2023-3817
Issue summary: Checking excessively long DH keys or parameters may be very slow. Impact summary: Applications that use the functions DH_check(), DH_check_ex() or EVP_PKEY_param_check() to check a DH key or DH parameters may experience long delays. Where the key or parameters that are being checked have been obtained from an untrusted source this may lead to a Denial of Service. The function DH_check() performs various checks on DH parameters. After fixing CVE-2023-3446 it was discovered that a large q parameter value can also trigger an overly long computation during some of these checks. A correct q value, if present, cannot be larger than the modulus p parameter, thus it is unnecessary to perform these checks if q is larger than p. An application that calls DH_check() and supplies a key or parameters obtained from an untrusted source could be vulnerable to a Denial of Service attack. The function DH_check() is itself called by a number of other OpenSSL functions. An application ca...

CVE-2023-3817
Issue summary: Checking excessively long DH keys or parameters may be very slow. Impact summary: Applications that use the functions DH_check(), DH_check_ex() or EVP_PKEY_param_check() to check a DH key or DH parameters may experience long delays. Where the key or parameters that are being checked have been obtained from an untrusted source this may lead to a Denial of Service. The function DH_check() performs various checks on DH parameters. After fixing CVE-2023-3446 it was discovered that a large q parameter value can also trigger an overly long computation during some of these checks. A correct q value, if present, cannot be larger than the modulus p parameter, thus it is unnecessary to perform these checks if q is larger than p. An application that calls DH_check() and supplies a key or parameters obtained from an untrusted source could be vulnerable to a Denial of Service attack. The function DH_check() is itself called by a number of other OpenSSL functions. An application c

CVE-2023-3817
CVE-2023-3817
Issue summary: Checking excessively long DH keys or parameters may be ...

SUSE-SU-2023:3958-1
Security update for openssl-1_1

SUSE-SU-2023:3397-1
Security update for openssl-1_1

SUSE-SU-2023:3339-1
Security update for openssl-1_0_0

SUSE-SU-2023:3338-1
Security update for openssl-1_0_0

SUSE-SU-2023:3308-1
Security update for openssl-1_0_0

SUSE-SU-2023:3291-2
Security update for openssl-1_1

SUSE-SU-2023:3244-1
Security update for openssl-3

SUSE-SU-2023:3243-1
Security update for openssl-3

SUSE-SU-2023:3242-1
Security update for openssl-1_1

SUSE-SU-2023:3239-1
Security update for openssl-1_1
GHSA-c945-cqj5-wfv6
Issue summary: Checking excessively long DH keys or parameters may be very slow. Impact summary: Applications that use the functions DH_check(), DH_check_ex() or EVP_PKEY_param_check() to check a DH key or DH parameters may experience long delays. Where the key or parameters that are being checked have been obtained from an untrusted source this may lead to a Denial of Service. The function DH_check() performs various checks on DH parameters. After fixing CVE-2023-3446 it was discovered that a large q parameter value can also trigger an overly long computation during some of these checks. A correct q value, if present, cannot be larger than the modulus p parameter, thus it is unnecessary to perform these checks if q is larger than p. An application that calls DH_check() and supplies a key or parameters obtained from an untrusted source could be vulnerable to a Denial of Service attack. The function DH_check() is itself called by a number of other OpenSSL functions. An applicatio...

BDU:2023-04960
Уязвимость функций DH_check(), DH_check_ex(), EVP_PKEY_param_check() библиотеки OpenSSL, позволяющая нарушителю вызвать отказ в обслуживании

SUSE-SU-2023:4190-1
Security update for openssl-3

SUSE-SU-2023:4189-1
Security update for openssl-3
ELSA-2024-12056
ELSA-2024-12056: openssl security update (MODERATE)
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
---|---|---|---|---|
![]() | CVE-2023-3817 Issue summary: Checking excessively long DH keys or parameters may be very slow. Impact summary: Applications that use the functions DH_check(), DH_check_ex() or EVP_PKEY_param_check() to check a DH key or DH parameters may experience long delays. Where the key or parameters that are being checked have been obtained from an untrusted source this may lead to a Denial of Service. The function DH_check() performs various checks on DH parameters. After fixing CVE-2023-3446 it was discovered that a large q parameter value can also trigger an overly long computation during some of these checks. A correct q value, if present, cannot be larger than the modulus p parameter, thus it is unnecessary to perform these checks if q is larger than p. An application that calls DH_check() and supplies a key or parameters obtained from an untrusted source could be vulnerable to a Denial of Service attack. The function DH_check() is itself called by a number of other OpenSSL functions. An application ca... | CVSS3: 5.3 | 0% Низкий | почти 2 года назад |
![]() | CVE-2023-3817 Issue summary: Checking excessively long DH keys or parameters may be very slow. Impact summary: Applications that use the functions DH_check(), DH_check_ex() or EVP_PKEY_param_check() to check a DH key or DH parameters may experience long delays. Where the key or parameters that are being checked have been obtained from an untrusted source this may lead to a Denial of Service. The function DH_check() performs various checks on DH parameters. After fixing CVE-2023-3446 it was discovered that a large q parameter value can also trigger an overly long computation during some of these checks. A correct q value, if present, cannot be larger than the modulus p parameter, thus it is unnecessary to perform these checks if q is larger than p. An application that calls DH_check() and supplies a key or parameters obtained from an untrusted source could be vulnerable to a Denial of Service attack. The function DH_check() is itself called by a number of other OpenSSL functions. An application ca... | CVSS3: 5.3 | 0% Низкий | почти 2 года назад |
![]() | CVE-2023-3817 Issue summary: Checking excessively long DH keys or parameters may be very slow. Impact summary: Applications that use the functions DH_check(), DH_check_ex() or EVP_PKEY_param_check() to check a DH key or DH parameters may experience long delays. Where the key or parameters that are being checked have been obtained from an untrusted source this may lead to a Denial of Service. The function DH_check() performs various checks on DH parameters. After fixing CVE-2023-3446 it was discovered that a large q parameter value can also trigger an overly long computation during some of these checks. A correct q value, if present, cannot be larger than the modulus p parameter, thus it is unnecessary to perform these checks if q is larger than p. An application that calls DH_check() and supplies a key or parameters obtained from an untrusted source could be vulnerable to a Denial of Service attack. The function DH_check() is itself called by a number of other OpenSSL functions. An application c | CVSS3: 5.3 | 0% Низкий | почти 2 года назад |
![]() | CVSS3: 5.3 | 0% Низкий | почти 2 года назад | |
CVE-2023-3817 Issue summary: Checking excessively long DH keys or parameters may be ... | CVSS3: 5.3 | 0% Низкий | почти 2 года назад | |
![]() | SUSE-SU-2023:3958-1 Security update for openssl-1_1 | 0% Низкий | больше 1 года назад | |
![]() | SUSE-SU-2023:3397-1 Security update for openssl-1_1 | 0% Низкий | почти 2 года назад | |
![]() | SUSE-SU-2023:3339-1 Security update for openssl-1_0_0 | 0% Низкий | почти 2 года назад | |
![]() | SUSE-SU-2023:3338-1 Security update for openssl-1_0_0 | 0% Низкий | почти 2 года назад | |
![]() | SUSE-SU-2023:3308-1 Security update for openssl-1_0_0 | 0% Низкий | почти 2 года назад | |
![]() | SUSE-SU-2023:3291-2 Security update for openssl-1_1 | 0% Низкий | больше 1 года назад | |
![]() | SUSE-SU-2023:3244-1 Security update for openssl-3 | 0% Низкий | почти 2 года назад | |
![]() | SUSE-SU-2023:3243-1 Security update for openssl-3 | 0% Низкий | почти 2 года назад | |
![]() | SUSE-SU-2023:3242-1 Security update for openssl-1_1 | 0% Низкий | почти 2 года назад | |
![]() | SUSE-SU-2023:3239-1 Security update for openssl-1_1 | 0% Низкий | почти 2 года назад | |
GHSA-c945-cqj5-wfv6 Issue summary: Checking excessively long DH keys or parameters may be very slow. Impact summary: Applications that use the functions DH_check(), DH_check_ex() or EVP_PKEY_param_check() to check a DH key or DH parameters may experience long delays. Where the key or parameters that are being checked have been obtained from an untrusted source this may lead to a Denial of Service. The function DH_check() performs various checks on DH parameters. After fixing CVE-2023-3446 it was discovered that a large q parameter value can also trigger an overly long computation during some of these checks. A correct q value, if present, cannot be larger than the modulus p parameter, thus it is unnecessary to perform these checks if q is larger than p. An application that calls DH_check() and supplies a key or parameters obtained from an untrusted source could be vulnerable to a Denial of Service attack. The function DH_check() is itself called by a number of other OpenSSL functions. An applicatio... | CVSS3: 5.3 | 0% Низкий | почти 2 года назад | |
![]() | BDU:2023-04960 Уязвимость функций DH_check(), DH_check_ex(), EVP_PKEY_param_check() библиотеки OpenSSL, позволяющая нарушителю вызвать отказ в обслуживании | CVSS3: 5.3 | 0% Низкий | почти 2 года назад |
![]() | SUSE-SU-2023:4190-1 Security update for openssl-3 | больше 1 года назад | ||
![]() | SUSE-SU-2023:4189-1 Security update for openssl-3 | больше 1 года назад | ||
ELSA-2024-12056 ELSA-2024-12056: openssl security update (MODERATE) | больше 1 года назад |
Уязвимостей на страницу