Lucene search

K
nvd[email protected]NVD:CVE-2023-3817
HistoryJul 31, 2023 - 4:15 p.m.

CVE-2023-3817

2023-07-3116:15:10
CWE-834
web.nvd.nist.gov
dh_check
evp_pkey_param_check
denial of service

5.3 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

LOW

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L

6.1 Medium

AI Score

Confidence

High

0.003 Low

EPSS

Percentile

65.5%

Issue summary: Checking excessively long DH keys or parameters may be very slow.

Impact summary: Applications that use the functions DH_check(), DH_check_ex()
or EVP_PKEY_param_check() to check a DH key or DH parameters may experience long
delays. Where the key or parameters that are being checked have been obtained
from an untrusted source this may lead to a Denial of Service.

The function DH_check() performs various checks on DH parameters. After fixing
CVE-2023-3446 it was discovered that a large q parameter value can also trigger
an overly long computation during some of these checks. A correct q value,
if present, cannot be larger than the modulus p parameter, thus it is
unnecessary to perform these checks if q is larger than p.

An application that calls DH_check() and supplies a key or parameters obtained
from an untrusted source could be vulnerable to a Denial of Service attack.

The function DH_check() is itself called by a number of other OpenSSL functions.
An application calling any of those other functions may similarly be affected.
The other functions affected by this are DH_check_ex() and
EVP_PKEY_param_check().

Also vulnerable are the OpenSSL dhparam and pkeyparam command line applications
when using the “-check” option.

The OpenSSL SSL/TLS implementation is not affected by this issue.

The OpenSSL 3.0 and 3.1 FIPS providers are not affected by this issue.

Affected configurations

NVD
Node
opensslopensslRange3.0.03.0.10
OR
opensslopensslRange3.1.03.1.2
OR
opensslopensslMatch1.0.2-
OR
opensslopensslMatch1.0.2beta1
OR
opensslopensslMatch1.0.2beta2
OR
opensslopensslMatch1.0.2beta3
OR
opensslopensslMatch1.0.2a
OR
opensslopensslMatch1.0.2b
OR
opensslopensslMatch1.0.2c
OR
opensslopensslMatch1.0.2d
OR
opensslopensslMatch1.0.2e
OR
opensslopensslMatch1.0.2f
OR
opensslopensslMatch1.0.2g
OR
opensslopensslMatch1.0.2h
OR
opensslopensslMatch1.0.2i
OR
opensslopensslMatch1.0.2j
OR
opensslopensslMatch1.0.2k
OR
opensslopensslMatch1.0.2l
OR
opensslopensslMatch1.0.2m
OR
opensslopensslMatch1.0.2n
OR
opensslopensslMatch1.0.2o
OR
opensslopensslMatch1.0.2p
OR
opensslopensslMatch1.0.2q
OR
opensslopensslMatch1.0.2r
OR
opensslopensslMatch1.0.2s
OR
opensslopensslMatch1.0.2t
OR
opensslopensslMatch1.0.2u
OR
opensslopensslMatch1.0.2v
OR
opensslopensslMatch1.0.2w
OR
opensslopensslMatch1.0.2x
OR
opensslopensslMatch1.0.2y
OR
opensslopensslMatch1.0.2za
OR
opensslopensslMatch1.0.2zb
OR
opensslopensslMatch1.0.2zc
OR
opensslopensslMatch1.0.2zd
OR
opensslopensslMatch1.0.2ze
OR
opensslopensslMatch1.0.2zf
OR
opensslopensslMatch1.0.2zg
OR
opensslopensslMatch1.0.2zh
OR
opensslopensslMatch1.1.1-
OR
opensslopensslMatch1.1.1pre1
OR
opensslopensslMatch1.1.1pre2
OR
opensslopensslMatch1.1.1pre3
OR
opensslopensslMatch1.1.1pre4
OR
opensslopensslMatch1.1.1pre5
OR
opensslopensslMatch1.1.1pre6
OR
opensslopensslMatch1.1.1pre7
OR
opensslopensslMatch1.1.1pre8
OR
opensslopensslMatch1.1.1pre9
OR
opensslopensslMatch1.1.1a
OR
opensslopensslMatch1.1.1b
OR
opensslopensslMatch1.1.1c
OR
opensslopensslMatch1.1.1d
OR
opensslopensslMatch1.1.1e
OR
opensslopensslMatch1.1.1f
OR
opensslopensslMatch1.1.1g
OR
opensslopensslMatch1.1.1h
OR
opensslopensslMatch1.1.1i
OR
opensslopensslMatch1.1.1j
OR
opensslopensslMatch1.1.1k
OR
opensslopensslMatch1.1.1l
OR
opensslopensslMatch1.1.1m
OR
opensslopensslMatch1.1.1n
OR
opensslopensslMatch1.1.1o
OR
opensslopensslMatch1.1.1p
OR
opensslopensslMatch1.1.1q
OR
opensslopensslMatch1.1.1r
OR
opensslopensslMatch1.1.1s
OR
opensslopensslMatch1.1.1t
OR
opensslopensslMatch1.1.1u

References

5.3 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

LOW

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L

6.1 Medium

AI Score

Confidence

High

0.003 Low

EPSS

Percentile

65.5%