Lucene search

K
cvelistOpensslCVELIST:CVE-2018-0732
HistoryJun 12, 2018 - 12:00 a.m.

CVE-2018-0732 Client DoS due to large DH parameter

2018-06-1200:00:00
openssl
www.cve.org
1

7.7 High

AI Score

Confidence

High

0.042 Low

EPSS

Percentile

92.3%

During key agreement in a TLS handshake using a DH(E) based ciphersuite a malicious server can send a very large prime value to the client. This will cause the client to spend an unreasonably long period of time generating a key for this prime resulting in a hang until the client has finished. This could be exploited in a Denial Of Service attack. Fixed in OpenSSL 1.1.0i-dev (Affected 1.1.0-1.1.0h). Fixed in OpenSSL 1.0.2p-dev (Affected 1.0.2-1.0.2o).

CNA Affected

[
  {
    "product": "OpenSSL",
    "vendor": "OpenSSL",
    "versions": [
      {
        "status": "affected",
        "version": "Fixed in OpenSSL 1.1.0i-dev (Affected 1.1.0-1.1.0h)"
      },
      {
        "status": "affected",
        "version": "Fixed in OpenSSL 1.0.2p-dev (Affected 1.0.2-1.0.2o)"
      }
    ]
  }
]

References