Lucene search

K
redhatcveRedhat.comRH:CVE-2023-6237
HistoryJan 15, 2024 - 6:31 p.m.

CVE-2023-6237

2024-01-1518:31:13
redhat.com
access.redhat.com
77
openssl
evp_pkey_public_check
rsa
dos
attack
untrusted sources

6.9 Medium

AI Score

Confidence

Low

0.0004 Low

EPSS

Percentile

10.4%

A flaw was found in OpenSSL. When the EVP_PKEY_public_check() function is called in RSA public keys, a computation is done to confirm that the RSA modulus, n, is composite. For valid RSA keys, n is a product of two or more large primes and this computation completes quickly. However, if n is a large prime, this computation takes a long time. An application that calls EVP_PKEY_public_check() and supplies an RSA key obtained from an untrusted source could be vulnerable to a Denial of Service attack.

Mitigation

Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.