Show plain JSON{"id": "CVE-2023-3817", "cveTags": [], "metrics": {"cvssMetricV31": [{"type": "Primary", "source": "nvd@nist.gov", "cvssData": {"scope": "UNCHANGED", "version": "3.1", "baseScore": 5.3, "attackVector": "NETWORK", "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "integrityImpact": "NONE", "userInteraction": "NONE", "attackComplexity": "LOW", "availabilityImpact": "LOW", "privilegesRequired": "NONE", "confidentialityImpact": "NONE"}, "impactScore": 1.4, "exploitabilityScore": 3.9}]}, "published": "2023-07-31T16:15:10.497", "references": [{"url": "http://seclists.org/fulldisclosure/2023/Jul/43", "tags": ["Mailing List", "Third Party Advisory"], "source": "openssl-security@openssl.org"}, {"url": "http://www.openwall.com/lists/oss-security/2023/07/31/1", "tags": ["Mailing List"], "source": "openssl-security@openssl.org"}, {"url": "http://www.openwall.com/lists/oss-security/2023/09/22/11", "source": "openssl-security@openssl.org"}, {"url": "http://www.openwall.com/lists/oss-security/2023/09/22/9", "source": "openssl-security@openssl.org"}, {"url": "http://www.openwall.com/lists/oss-security/2023/11/06/2", "source": "openssl-security@openssl.org"}, {"url": "https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=6a1eb62c29db6cb5eec707f9338aee00f44e26f5", "tags": ["Mailing List", "Patch"], "source": "openssl-security@openssl.org"}, {"url": "https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=869ad69aadd985c7b8ca6f4e5dd0eb274c9f3644", "tags": ["Broken Link"], "source": "openssl-security@openssl.org"}, {"url": "https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=9002fd07327a91f35ba6c1307e71fa6fd4409b7f", "tags": ["Mailing List", "Patch"], "source": "openssl-security@openssl.org"}, {"url": "https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=91ddeba0f2269b017dc06c46c993a788974b1aa5", "tags": ["Mailing List", "Patch"], "source": "openssl-security@openssl.org"}, {"url": "https://lists.debian.org/debian-lts-announce/2023/08/msg00019.html", "source": "openssl-security@openssl.org"}, {"url": "https://security.gentoo.org/glsa/202402-08", "source": "openssl-security@openssl.org"}, {"url": "https://security.netapp.com/advisory/ntap-20230818-0014/", "source": "openssl-security@openssl.org"}, {"url": "https://security.netapp.com/advisory/ntap-20231027-0008/", "source": "openssl-security@openssl.org"}, {"url": "https://security.netapp.com/advisory/ntap-20240621-0006/", "source": "openssl-security@openssl.org"}, {"url": "https://www.openssl.org/news/secadv/20230731.txt", "tags": ["Vendor Advisory"], "source": "openssl-security@openssl.org"}], "vulnStatus": "Modified", "weaknesses": [{"type": "Primary", "source": "nvd@nist.gov", "description": [{"lang": "en", "value": "CWE-834"}]}], "descriptions": [{"lang": "en", "value": "Issue summary: Checking excessively long DH keys or parameters may be very slow.\n\nImpact summary: Applications that use the functions DH_check(), DH_check_ex()\nor EVP_PKEY_param_check() to check a DH key or DH parameters may experience long\ndelays. Where the key or parameters that are being checked have been obtained\nfrom an untrusted source this may lead to a Denial of Service.\n\nThe function DH_check() performs various checks on DH parameters. After fixing\nCVE-2023-3446 it was discovered that a large q parameter value can also trigger\nan overly long computation during some of these checks. A correct q value,\nif present, cannot be larger than the modulus p parameter, thus it is\nunnecessary to perform these checks if q is larger than p.\n\nAn application that calls DH_check() and supplies a key or parameters obtained\nfrom an untrusted source could be vulnerable to a Denial of Service attack.\n\nThe function DH_check() is itself called by a number of other OpenSSL functions.\nAn application calling any of those other functions may similarly be affected.\nThe other functions affected by this are DH_check_ex() and\nEVP_PKEY_param_check().\n\nAlso vulnerable are the OpenSSL dhparam and pkeyparam command line applications\nwhen using the \"-check\" option.\n\nThe OpenSSL SSL/TLS implementation is not affected by this issue.\n\nThe OpenSSL 3.0 and 3.1 FIPS providers are not affected by this issue."}], "lastModified": "2024-06-21T19:15:28.010", "configurations": [{"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:a:openssl:openssl:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E327FF28-8035-4914-B7D9-F96780BD9C5E", "versionEndExcluding": "3.0.10", "versionStartIncluding": "3.0.0"}, {"criteria": "cpe:2.3:a:openssl:openssl:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "9BA338C8-1C98-4928-9661-BC82501A8972", "versionEndExcluding": "3.1.2", "versionStartIncluding": "3.1.0"}, {"criteria": "cpe:2.3:a:openssl:openssl:1.0.2:-:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "CF0E6EB1-D656-458E-82B6-8C1ABDC13CB9"}, {"criteria": "cpe:2.3:a:openssl:openssl:1.0.2:beta1:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "18797BEE-417D-4959-9AAD-C5A7C051B524"}, {"criteria": "cpe:2.3:a:openssl:openssl:1.0.2:beta2:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "6FAA3C31-BD9D-45A9-A502-837FECA6D479"}, {"criteria": "cpe:2.3:a:openssl:openssl:1.0.2:beta3:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "6455A421-9956-4846-AC7C-3431E0D37D23"}, {"criteria": "cpe:2.3:a:openssl:openssl:1.0.2a:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "60F946FD-F564-49DA-B043-5943308BA9EE"}, {"criteria": "cpe:2.3:a:openssl:openssl:1.0.2b:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "4847BCF3-EFCE-41AF-8E7D-3D51EB9DCC5B"}, {"criteria": "cpe:2.3:a:openssl:openssl:1.0.2c:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "9B89180B-FB68-4DD8-B076-16E51CC7FB91"}, {"criteria": "cpe:2.3:a:openssl:openssl:1.0.2d:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "4C986592-4086-4A39-9767-EF34DBAA6A53"}, {"criteria": "cpe:2.3:a:openssl:openssl:1.0.2e:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "7B23181C-03DB-4E92-B3F6-6B585B5231B4"}, {"criteria": "cpe:2.3:a:openssl:openssl:1.0.2f:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "94D9EC1C-4843-4026-9B05-E060E9391734"}, {"criteria": "cpe:2.3:a:openssl:openssl:1.0.2g:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "B066401C-21CF-4BE9-9C55-C9F1E0C7BE3F"}, {"criteria": "cpe:2.3:a:openssl:openssl:1.0.2h:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "036FB24F-7D86-4730-8BC9-722875BEC807"}, {"criteria": "cpe:2.3:a:openssl:openssl:1.0.2i:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "FDF148A3-1AA7-4F27-85AB-414C609C626F"}, {"criteria": "cpe:2.3:a:openssl:openssl:1.0.2j:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E15B749E-6808-4788-AE42-7A1587D8697E"}, {"criteria": "cpe:2.3:a:openssl:openssl:1.0.2k:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "58F80C8D-BCA2-40AD-BD22-B70C7BE1B298"}, {"criteria": "cpe:2.3:a:openssl:openssl:1.0.2l:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "70B78EDF-6BB7-42C4-9423-9332C62C6E43"}, {"criteria": "cpe:2.3:a:openssl:openssl:1.0.2m:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E2354F82-A01B-43D2-84F4-4E94B258E091"}, {"criteria": "cpe:2.3:a:openssl:openssl:1.0.2n:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "59AAE340-19BC-4879-AC48-9F4F338A3B61"}, {"criteria": "cpe:2.3:a:openssl:openssl:1.0.2o:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "6264EB97-9FBE-4DEB-A81D-EA0B2E4437FF"}, {"criteria": "cpe:2.3:a:openssl:openssl:1.0.2p:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "59B58D80-485A-4CBD-9220-D6FDBD6FEE65"}, {"criteria": "cpe:2.3:a:openssl:openssl:1.0.2q:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "9B1131CC-526D-45FF-ABEB-164100D0BE0D"}, {"criteria": "cpe:2.3:a:openssl:openssl:1.0.2r:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "0739C502-4EDB-4D08-B2B9-04FAB98AFE02"}, {"criteria": "cpe:2.3:a:openssl:openssl:1.0.2s:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "AB045D51-DAD7-44E1-BA80-4C90F0F4335F"}, {"criteria": "cpe:2.3:a:openssl:openssl:1.0.2t:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "5A745BE4-2249-4251-8AD1-43F0F7EF2755"}, {"criteria": "cpe:2.3:a:openssl:openssl:1.0.2u:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "DAEB85A6-B9F9-4EC1-942F-7E17A3854600"}, {"criteria": "cpe:2.3:a:openssl:openssl:1.0.2v:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "7D6D42CF-82FC-4A6F-9C4C-6DBF9470CABB"}, {"criteria": "cpe:2.3:a:openssl:openssl:1.0.2w:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "A6029EAB-8DDE-4995-AFC8-4C17BDEC8DFF"}, {"criteria": "cpe:2.3:a:openssl:openssl:1.0.2x:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "EF8EEF0A-623B-46A8-9C0D-F5EC490128DC"}, {"criteria": "cpe:2.3:a:openssl:openssl:1.0.2y:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "024263ED-A240-4447-8926-E9D1EF4792E7"}, {"criteria": "cpe:2.3:a:openssl:openssl:1.0.2za:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "EEAC4D67-2D2A-45EF-8693-1D90EEC818EC"}, {"criteria": "cpe:2.3:a:openssl:openssl:1.0.2zb:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "A6852B09-CC89-4F9C-8245-59AD2C797AC1"}, {"criteria": "cpe:2.3:a:openssl:openssl:1.0.2zc:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "3A7A844C-EB18-443B-8B33-86C98BFF683E"}, {"criteria": "cpe:2.3:a:openssl:openssl:1.0.2zd:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "8538CCF3-19C0-4E55-B5F7-AC07A1D68E2C"}, {"criteria": "cpe:2.3:a:openssl:openssl:1.0.2ze:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "3CCDDB86-9910-4251-91B0-D56EDE93BF49"}, {"criteria": "cpe:2.3:a:openssl:openssl:1.0.2zf:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "96BA4105-67FF-43BD-A655-7F5741AD8F8F"}, {"criteria": "cpe:2.3:a:openssl:openssl:1.0.2zg:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "DC2EEB54-2A48-4DB7-B95C-4B5072B98858"}, {"criteria": "cpe:2.3:a:openssl:openssl:1.0.2zh:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "A32F8FD2-79D4-4349-95EF-8B2448993CAF"}, {"criteria": "cpe:2.3:a:openssl:openssl:1.1.1:-:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "A8C84061-63BE-49F6-B2F0-D96847E755E0"}, {"criteria": "cpe:2.3:a:openssl:openssl:1.1.1:pre1:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "811DBBDB-4DD9-4440-A9EC-F97B161F1E1D"}, {"criteria": "cpe:2.3:a:openssl:openssl:1.1.1:pre2:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "8A5C2FE6-8BFB-4C73-83E9-0CF230D4B452"}, {"criteria": "cpe:2.3:a:openssl:openssl:1.1.1:pre3:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "230480C2-314E-4465-B09D-101DCC475E7C"}, {"criteria": "cpe:2.3:a:openssl:openssl:1.1.1:pre4:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "5474A1A5-81F9-4B15-B145-C327EB098740"}, {"criteria": "cpe:2.3:a:openssl:openssl:1.1.1:pre5:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "7EEDDD3D-0598-4F1F-93CB-FAF6757BFF1B"}, {"criteria": "cpe:2.3:a:openssl:openssl:1.1.1:pre6:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "ED226FB6-07FD-4713-BEFE-94456FA6F82F"}, {"criteria": "cpe:2.3:a:openssl:openssl:1.1.1:pre7:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "11AE7A76-811B-46D0-9173-BC5A48560F67"}, {"criteria": "cpe:2.3:a:openssl:openssl:1.1.1:pre8:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "A4955261-CCEB-472B-9535-98B0CE04A321"}, {"criteria": "cpe:2.3:a:openssl:openssl:1.1.1:pre9:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C36FAE41-0B70-4049-9AFA-8F762EF4FB00"}, {"criteria": "cpe:2.3:a:openssl:openssl:1.1.1a:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "42649AB8-1443-4036-9873-160D913BAD68"}, {"criteria": "cpe:2.3:a:openssl:openssl:1.1.1b:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "8AE4A4BC-31BE-4EC5-907C-295D98484ABB"}, {"criteria": "cpe:2.3:a:openssl:openssl:1.1.1c:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D8A852AB-AE4C-4794-BE45-D49EECA9D440"}, {"criteria": "cpe:2.3:a:openssl:openssl:1.1.1d:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "6B34CE8C-FF32-433B-8527-CA04E7835AC5"}, {"criteria": "cpe:2.3:a:openssl:openssl:1.1.1e:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "F73E774D-C6EB-4776-A847-3F331EC77204"}, {"criteria": "cpe:2.3:a:openssl:openssl:1.1.1f:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "BF6D1346-43CD-41DE-9021-A98157FED8B8"}, {"criteria": "cpe:2.3:a:openssl:openssl:1.1.1g:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C7364FED-4719-4EF5-8ABB-D36CBD8BE402"}, {"criteria": "cpe:2.3:a:openssl:openssl:1.1.1h:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "14479639-DF33-4AB7-B781-791BF8DA8382"}, {"criteria": "cpe:2.3:a:openssl:openssl:1.1.1i:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "900C1008-F297-47FD-A1BD-11A3BEFF02E0"}, {"criteria": "cpe:2.3:a:openssl:openssl:1.1.1j:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "AD1A1441-D118-4557-A8AA-88B20D332ED5"}, {"criteria": "cpe:2.3:a:openssl:openssl:1.1.1k:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "8AACE259-34C9-4100-8730-5BDA4B1B1A66"}, {"criteria": "cpe:2.3:a:openssl:openssl:1.1.1l:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "BAF15ABD-322D-413F-9707-C2A4508629D7"}, {"criteria": "cpe:2.3:a:openssl:openssl:1.1.1m:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "69FAF390-8141-4451-9D80-76155BD4EADC"}, {"criteria": "cpe:2.3:a:openssl:openssl:1.1.1n:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "0A54842A-332F-4092-ABE0-F3323541BE67"}, {"criteria": "cpe:2.3:a:openssl:openssl:1.1.1o:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "FB72FEE3-190B-4326-ACD0-F52110536526"}, {"criteria": "cpe:2.3:a:openssl:openssl:1.1.1p:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "1AF40BB0-0C57-4BCD-815F-A3FF4EB42D14"}, {"criteria": "cpe:2.3:a:openssl:openssl:1.1.1q:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "EA111F81-1347-4D7D-BA0F-88350174DAFC"}, {"criteria": "cpe:2.3:a:openssl:openssl:1.1.1r:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "46E4334B-6203-49B1-83E6-381E6D12DCBA"}, {"criteria": "cpe:2.3:a:openssl:openssl:1.1.1s:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "B76E919B-5E08-4C04-80FF-5F9DBA244B71"}, {"criteria": "cpe:2.3:a:openssl:openssl:1.1.1t:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "6F1DE6C9-DCAF-4896-912D-443A32B918F6"}, {"criteria": "cpe:2.3:a:openssl:openssl:1.1.1u:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C5C8A0C3-BAAF-43D7-B782-5EA17539D7EF"}], "operator": "OR"}]}], "sourceIdentifier": "openssl-security@openssl.org"}