CVE-2023-3817

Issue summary: Checking excessively long DH keys or parameters may be very slow. Impact summary: Applications that use the functions DH_check(), DH_check_ex() or EVP_PKEY_param_check() to check a DH key or DH parameters may experience long delays. Where the key or parameters that are being checked have been obtained from an untrusted source this may lead to a Denial of Service. The function DH_check() performs various checks on DH parameters. After fixing CVE-2023-3446 it was discovered that a large q parameter value can also trigger an overly long computation during some of these checks. A correct q value, if present, cannot be larger than the modulus p parameter, thus it is unnecessary to perform these checks if q is larger than p. An application that calls DH_check() and supplies a key or parameters obtained from an untrusted source could be vulnerable to a Denial of Service attack. The function DH_check() is itself called by a number of other OpenSSL functions. An application calling any of those other functions may similarly be affected. The other functions affected by this are DH_check_ex() and EVP_PKEY_param_check(). Also vulnerable are the OpenSSL dhparam and pkeyparam command line applications when using the "-check" option. The OpenSSL SSL/TLS implementation is not affected by this issue. The OpenSSL 3.0 and 3.1 FIPS providers are not affected by this issue.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:openssl:openssl:*:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:*:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:1.0.2:-:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:1.0.2:beta1:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:1.0.2:beta2:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:1.0.2:beta3:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:1.0.2a:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:1.0.2b:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:1.0.2c:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:1.0.2d:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:1.0.2e:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:1.0.2f:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:1.0.2g:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:1.0.2h:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:1.0.2i:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:1.0.2j:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:1.0.2k:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:1.0.2l:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:1.0.2m:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:1.0.2n:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:1.0.2o:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:1.0.2p:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:1.0.2q:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:1.0.2r:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:1.0.2s:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:1.0.2t:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:1.0.2u:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:1.0.2v:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:1.0.2w:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:1.0.2x:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:1.0.2y:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:1.0.2za:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:1.0.2zb:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:1.0.2zc:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:1.0.2zd:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:1.0.2ze:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:1.0.2zf:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:1.0.2zg:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:1.0.2zh:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:1.1.1:-:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:1.1.1:pre1:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:1.1.1:pre2:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:1.1.1:pre3:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:1.1.1:pre4:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:1.1.1:pre5:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:1.1.1:pre6:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:1.1.1:pre7:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:1.1.1:pre8:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:1.1.1:pre9:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:1.1.1a:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:1.1.1b:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:1.1.1c:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:1.1.1d:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:1.1.1e:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:1.1.1f:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:1.1.1g:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:1.1.1h:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:1.1.1i:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:1.1.1j:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:1.1.1k:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:1.1.1l:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:1.1.1m:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:1.1.1n:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:1.1.1o:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:1.1.1p:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:1.1.1q:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:1.1.1r:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:1.1.1s:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:1.1.1t:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:1.1.1u:*:*:*:*:*:*:*

History

No history.

Information

Published : 2023-07-31 16:15

Updated : 2024-06-21 19:15


NVD link : CVE-2023-3817

Mitre link : CVE-2023-3817

CVE.ORG link : CVE-2023-3817


JSON object : View

Products Affected

openssl

  • openssl
CWE
CWE-834

Excessive Iteration