Lucene search

K
ubuntucveUbuntu.comUB:CVE-2024-4603
HistoryMay 16, 2024 - 12:00 a.m.

CVE-2024-4603

2024-05-1600:00:00
ubuntu.com
ubuntu.com
18
excessive time checking
dsa keys parameters
unix
low severity

6.3 Medium

AI Score

Confidence

Low

0.0004 Low

EPSS

Percentile

10.4%

Issue summary: Checking excessively long DSA keys or parameters may be very
slow. Impact summary: Applications that use the functions
EVP_PKEY_param_check() or EVP_PKEY_public_check() to check a DSA public key
or DSA parameters may experience long delays. Where the key or parameters
that are being checked have been obtained from an untrusted source this may
lead to a Denial of Service. The functions EVP_PKEY_param_check() or
EVP_PKEY_public_check() perform various checks on DSA parameters. Some of
those computations take a long time if the modulus (p parameter) is too
large. Trying to use a very large modulus is slow and OpenSSL will not
allow using public keys with a modulus which is over 10,000 bits in length
for signature verification. However the key and parameter check functions
do not limit the modulus size when performing the checks. An application
that calls EVP_PKEY_param_check() or EVP_PKEY_public_check() and supplies a
key or parameters obtained from an untrusted source could be vulnerable to
a Denial of Service attack. These functions are not called by OpenSSL
itself on untrusted DSA keys so only applications that directly call these
functions may be vulnerable. Also vulnerable are the OpenSSL pkey and
pkeyparam command line applications when using the -check option. The
OpenSSL SSL/TLS implementation is not affected by this issue. The OpenSSL
3.0 and 3.1 FIPS providers are affected by this issue.

Notes

Author Note
Priority reason: Upstream OpenSSL project has rated this a being a low severity issue
mdeslaur per upstream, 3.x only

6.3 Medium

AI Score

Confidence

Low

0.0004 Low

EPSS

Percentile

10.4%