Lucene search

K
prionPRIOn knowledge basePRION:CVE-2023-24609
HistoryDec 22, 2023 - 4:15 a.m.

Integer overflow

2023-12-2204:15:00
PRIOn knowledge base
www.prio-n.com
4
integer overflow
matrix ssl
rambus tls toolkit
client hello
tls 1.3
sha-2
ram
cpu
tls messages

7.4 High

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

12.6%

Matrix SSL 4.x through 4.6.0 and Rambus TLS Toolkit have a length-subtraction integer overflow for Client Hello Pre-Shared Key extension parsing in the TLS 1.3 server. An attacked device calculates an SHA-2 hash over at least 65 KB (in RAM). With a large number of crafted TLS messages, the CPU becomes heavily loaded. This occurs in tls13VerifyBinder and tls13TranscriptHashUpdate.

CPENameOperatorVersion
matrixsslge4.0.0
matrixsslle4.6.0

7.4 High

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

12.6%

Related for PRION:CVE-2023-24609