CVE-2023-3817 - Excessive Iteration

Severity

53%

Complexity

39%

Confidentiality

23%

Issue summary: Checking excessively long DH keys or parameters may be very slow. Impact summary: Applications that use the functions DH_check(), DH_check_ex() or EVP_PKEY_param_check() to check a DH key or DH parameters may experience long delays. Where the key or parameters that are being checked have been obtained from an untrusted source this may lead to a Denial of Service. The function DH_check() performs various checks on DH parameters. After fixing CVE-2023-3446 it was discovered that a large q parameter value can also trigger an overly long computation during some of these checks. A correct q value, if present, cannot be larger than the modulus p parameter, thus it is unnecessary to perform these checks if q is larger than p. An application that calls DH_check() and supplies a key or parameters obtained from an untrusted source could be vulnerable to a Denial of Service attack. The function DH_check() is itself called by a number of other OpenSSL functions. An application calling any of those other functions may similarly be affected. The other functions affected by this are DH_check_ex() and EVP_PKEY_param_check(). Also vulnerable are the OpenSSL dhparam and pkeyparam command line applications when using the "-check" option. The OpenSSL SSL/TLS implementation is not affected by this issue. The OpenSSL 3.0 and 3.1 FIPS providers are not affected by this issue.

CVSS 3.1 Base Score 5.3. CVSS Attack Vector: network. CVSS Attack Complexity: low. CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).

Overview

First reported 1 year ago

2023-07-31 16:15:00

Last updated 1 year ago

2023-11-06 19:15:00

Affected Software

OpenSSL OpenSSL 1.0.2a

1.0.2a

OpenSSL 1.0.2e

1.0.2e

OpenSSL1.0.2j

1.0.2j

OpenSSL Project OpenSSL 1.0.2b

1.0.2b

OpenSSL Project 1.0.2g

1.0.2g

OpenSSL 1.0.2h

1.0.2h

OpenSSL Project OpenSSL 1.0.2c

1.0.2c

OpenSSL 1.0.2 Beta 3

1.0.2

OpenSSL Project OpenSSL 1.0.2-beta1

1.0.2

OpenSSL 1.0.2f

1.0.2f

OpenSSL 1.0.2 Beta 2

1.0.2

OpenSSL Project OpenSSL 1.0.2i

1.0.2i

OpenSSL OpenSSL 1.0.2d

1.0.2d

OpenSSL 1.0.2k

1.0.2k

OpenSSL 1.0.2l

1.0.2l

OpenSSL 1.0.2m

1.0.2m

OpenSSL Project OpenSSL 1.0.2n

1.0.2n

OpenSSL Project OpenSSL 1.0.2o

1.0.2o

OpenSSL Project OpenSSL 1.0.2p

1.0.2p

OpenSSL Project OpenSSL 1.0.2q

1.0.2q

OpenSSL Project OpenSSL 1.0.2r

1.0.2r

OpenSSL Project OpenSSL 1.0.2s

1.0.2s

OpenSSL Project OpenSSL 1.0.2t

1.0.2t

OpenSSL Project OpenSSL 1.1.1 Pre1

1.1.1

OpenSSL Project OpenSSL 1.1.1 Pre2

1.1.1

OpenSSL Project OpenSSL 1.1.1 Pre3

1.1.1

OpenSSL Project OpenSSL 1.1.1 Pre4

1.1.1

OpenSSL Project OpenSSL 1.1.1 Pre5

1.1.1

OpenSSL Project OpenSSL 1.1.1 Pre6

1.1.1

OpenSSL Project OpenSSL 1.1.1 Pre7

1.1.1

OpenSSL Project OpenSSL 1.1.1 Pre8

1.1.1

OpenSSL Project OpenSSL 1.1.1 Pre9

1.1.1

OpenSSL Project OpenSSL 1.1.1a

1.1.1a

OpenSSL Project OpenSSL 1.1.1b

1.1.1b

OpenSSL Project OpenSSL 1.1.1c

1.1.1c

OpenSSL Project OpenSSL 1.1.1d

1.1.1d

OpenSSL Project OpenSSL 1.1.1e

1.1.1e

OpenSSL Project OpenSSL 1.1.1f

1.1.1f

OpenSSL Project OpenSSL 1.1.1g

1.1.1g

OpenSSL Project OpenSSL

References

https://www.openssl.org/news/secadv/20230731.txt

https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=6a1eb62c29db6cb5eec707f9338aee00f44e26f5

https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=9002fd07327a91f35ba6c1307e71fa6fd4409b7f

https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=91ddeba0f2269b017dc06c46c993a788974b1aa5

https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=869ad69aadd985c7b8ca6f4e5dd0eb274c9f3644

http://www.openwall.com/lists/oss-security/2023/07/31/1

http://seclists.org/fulldisclosure/2023/Jul/43

https://www.openssl.org/news/secadv/20230731.txt

Vendor Advisory

https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=6a1eb62c29db6cb5eec707f9338aee00f44e26f5

Mailing List, Patch

https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=9002fd07327a91f35ba6c1307e71fa6fd4409b7f

Mailing List, Patch

https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=91ddeba0f2269b017dc06c46c993a788974b1aa5

Mailing List, Patch

https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=869ad69aadd985c7b8ca6f4e5dd0eb274c9f3644

Broken Link

http://www.openwall.com/lists/oss-security/2023/07/31/1

Mailing List

http://seclists.org/fulldisclosure/2023/Jul/43

Mailing List, Third Party Advisory

https://lists.debian.org/debian-lts-announce/2023/08/msg00019.html

https://security.netapp.com/advisory/ntap-20230818-0014/

http://www.openwall.com/lists/oss-security/2023/09/22/9

http://www.openwall.com/lists/oss-security/2023/09/22/11

https://security.netapp.com/advisory/ntap-20231027-0008/

http://www.openwall.com/lists/oss-security/2023/11/06/2

Stay updated

ExploitPedia is constantly evolving. Sign up to receive a notification when we release additional functionality.

Get in touch

If you'd like to report a bug or have any suggestions for improvements then please do get in touch with us using this form. We will get back to you as soon as we can.