Trinadh465 / Openssl-1.1.1g_CVE-2022-4304

Other
0 stars 0 forks source link

CVE-2023-3817 (Medium) detected in OpenSSLOpenSSL_1_1_1g #19

Open mend-bolt-for-github[bot] opened 4 months ago

mend-bolt-for-github[bot] commented 4 months ago

CVE-2023-3817 - Medium Severity Vulnerability

Vulnerable Library - OpenSSLOpenSSL_1_1_1g

TLS/SSL and crypto library

Library home page: https://github.com/OpenSSL/OpenSSL.git

Found in HEAD commit: 0849a3fd192d57f5888368340225f0e18d2de72b

Found in base branch: master

Vulnerable Source Files (2)

/crypto/dh/dh_check.c /crypto/dh/dh_check.c

Vulnerability Details

Issue summary: Checking excessively long DH keys or parameters may be very slow. Impact summary: Applications that use the functions DH_check(), DH_check_ex() or EVP_PKEY_param_check() to check a DH key or DH parameters may experience long delays. Where the key or parameters that are being checked have been obtained from an untrusted source this may lead to a Denial of Service. The function DH_check() performs various checks on DH parameters. After fixing CVE-2023-3446 it was discovered that a large q parameter value can also trigger an overly long computation during some of these checks. A correct q value, if present, cannot be larger than the modulus p parameter, thus it is unnecessary to perform these checks if q is larger than p. An application that calls DH_check() and supplies a key or parameters obtained from an untrusted source could be vulnerable to a Denial of Service attack. The function DH_check() is itself called by a number of other OpenSSL functions. An application calling any of those other functions may similarly be affected. The other functions affected by this are DH_check_ex() and EVP_PKEY_param_check(). Also vulnerable are the OpenSSL dhparam and pkeyparam command line applications when using the "-check" option. The OpenSSL SSL/TLS implementation is not affected by this issue. The OpenSSL 3.0 and 3.1 FIPS providers are not affected by this issue.

Publish Date: 2023-07-31

URL: CVE-2023-3817

CVSS 3 Score Details (5.3)

Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: None - Availability Impact: Low

For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Origin: https://mta.openssl.org/pipermail/openssl-announce/2023-July/000267.html

Release Date: 2023-07-31

Fix Resolution: openssl-3.0.10,openssl-3.1.2


Step up your Open Source Security Game with Mend here