CVE-2023-3817
Gravedad CVSS v3.1:
MEDIA
Tipo:
No Disponible / Otro tipo
Fecha de publicación:
31/07/2023
Última modificación:
14/10/2024
Descripción
*** Pendiente de traducción *** Issue summary: Checking excessively long DH keys or parameters may be very slow.<br />
<br />
Impact summary: Applications that use the functions DH_check(), DH_check_ex()<br />
or EVP_PKEY_param_check() to check a DH key or DH parameters may experience long<br />
delays. Where the key or parameters that are being checked have been obtained<br />
from an untrusted source this may lead to a Denial of Service.<br />
<br />
The function DH_check() performs various checks on DH parameters. After fixing<br />
CVE-2023-3446 it was discovered that a large q parameter value can also trigger<br />
an overly long computation during some of these checks. A correct q value,<br />
if present, cannot be larger than the modulus p parameter, thus it is<br />
unnecessary to perform these checks if q is larger than p.<br />
<br />
An application that calls DH_check() and supplies a key or parameters obtained<br />
from an untrusted source could be vulnerable to a Denial of Service attack.<br />
<br />
The function DH_check() is itself called by a number of other OpenSSL functions.<br />
An application calling any of those other functions may similarly be affected.<br />
The other functions affected by this are DH_check_ex() and<br />
EVP_PKEY_param_check().<br />
<br />
Also vulnerable are the OpenSSL dhparam and pkeyparam command line applications<br />
when using the "-check" option.<br />
<br />
The OpenSSL SSL/TLS implementation is not affected by this issue.<br />
<br />
The OpenSSL 3.0 and 3.1 FIPS providers are not affected by this issue.
Impacto
Puntuación base 3.x
5.30
Gravedad 3.x
MEDIA
Productos y versiones vulnerables
CPE | Desde | Hasta |
---|---|---|
cpe:2.3:a:openssl:openssl:*:*:*:*:*:*:*:* | 3.0.0 (incluyendo) | 3.0.10 (excluyendo) |
cpe:2.3:a:openssl:openssl:*:*:*:*:*:*:*:* | 3.1.0 (incluyendo) | 3.1.2 (excluyendo) |
cpe:2.3:a:openssl:openssl:1.0.2:-:*:*:*:*:*:* | ||
cpe:2.3:a:openssl:openssl:1.0.2:beta1:*:*:*:*:*:* | ||
cpe:2.3:a:openssl:openssl:1.0.2:beta2:*:*:*:*:*:* | ||
cpe:2.3:a:openssl:openssl:1.0.2:beta3:*:*:*:*:*:* | ||
cpe:2.3:a:openssl:openssl:1.0.2a:*:*:*:*:*:*:* | ||
cpe:2.3:a:openssl:openssl:1.0.2b:*:*:*:*:*:*:* | ||
cpe:2.3:a:openssl:openssl:1.0.2c:*:*:*:*:*:*:* | ||
cpe:2.3:a:openssl:openssl:1.0.2d:*:*:*:*:*:*:* | ||
cpe:2.3:a:openssl:openssl:1.0.2e:*:*:*:*:*:*:* | ||
cpe:2.3:a:openssl:openssl:1.0.2f:*:*:*:*:*:*:* | ||
cpe:2.3:a:openssl:openssl:1.0.2g:*:*:*:*:*:*:* | ||
cpe:2.3:a:openssl:openssl:1.0.2h:*:*:*:*:*:*:* | ||
cpe:2.3:a:openssl:openssl:1.0.2i:*:*:*:*:*:*:* |
Para consultar la lista completa de nombres de CPE con productos y versiones, ver esta página
Referencias a soluciones, herramientas e información
- https://git.openssl.org/gitweb/?p=openssl.git%3Ba%3Dcommitdiff%3Bh%3D6a1eb62c29db6cb5eec707f9338aee00f44e26f5
- https://git.openssl.org/gitweb/?p=openssl.git%3Ba%3Dcommitdiff%3Bh%3D869ad69aadd985c7b8ca6f4e5dd0eb274c9f3644
- https://git.openssl.org/gitweb/?p=openssl.git%3Ba%3Dcommitdiff%3Bh%3D9002fd07327a91f35ba6c1307e71fa6fd4409b7f
- https://git.openssl.org/gitweb/?p=openssl.git%3Ba%3Dcommitdiff%3Bh%3D91ddeba0f2269b017dc06c46c993a788974b1aa5
- https://www.openssl.org/news/secadv/20230731.txt