Lucene search

K
cve[email protected]CVE-2023-24609
HistoryDec 22, 2023 - 4:15 a.m.

CVE-2023-24609

2023-12-2204:15:08
CWE-190
web.nvd.nist.gov
16
cve-2023-24609
matrix ssl
rambus tls toolkit
integer overflow
length-subtraction
sha-2
tls 1.3
security vulnerability
nvd

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

7.6 High

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

12.6%

Matrix SSL 4.x through 4.6.0 and Rambus TLS Toolkit have a length-subtraction integer overflow for Client Hello Pre-Shared Key extension parsing in the TLS 1.3 server. An attacked device calculates an SHA-2 hash over at least 65 KB (in RAM). With a large number of crafted TLS messages, the CPU becomes heavily loaded. This occurs in tls13VerifyBinder and tls13TranscriptHashUpdate.

Affected configurations

NVD
Node
matrixsslmatrixsslRange4.0.04.6.0
Node
rambustls_toolkitMatch-
CPENameOperatorVersion
matrixssl:matrixsslmatrixsslle4.6.0

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

7.6 High

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

12.6%

Related for CVE-2023-24609