CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
HIGH
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
AI Score
Confidence
Low
EPSS
Percentile
77.2%
It was discovered that checking excessively long DH keys or parameters
may be very slow. A remote attacker could possibly use this issue to
cause OpenSSL to consume resources, resulting in a denial of service.
(CVE-2023-3446)
After the fix for CVE-2023-3446 Bernd Edlinger discovered that a large
q parameter value can also trigger an overly long computation during
some of these checks. A remote attacker could possibly use this issue
to cause OpenSSL to consume resources, resulting in a denial of
service. (CVE-2023-3817)
David Benjamin discovered that generating excessively long X9.42 DH
keys or checking excessively long X9.42 DH keys or parameters may be
very slow. A remote attacker could possibly use this issue to cause
OpenSSL to consume resources, resulting in a denial of service.
(CVE-2023-5678)
Bahaa Naamneh discovered that processing a maliciously formatted
PKCS12 file may lead OpenSSL to crash leading to a potential Denial of
Service attack. (CVE-2024-0727)
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
Ubuntu | 18.04 | noarch | libssl1.0.0 | < 1.0.2n-1ubuntu5.13+esm1 | UNKNOWN |
Ubuntu | 18.04 | noarch | libcrypto1.0.0-udeb | < 1.0.2n-1ubuntu5.13 | UNKNOWN |
Ubuntu | 18.04 | noarch | libssl1.0-dev | < 1.0.2n-1ubuntu5.13 | UNKNOWN |
Ubuntu | 18.04 | noarch | libssl1.0.0 | < 1.0.2n-1ubuntu5.13 | UNKNOWN |
Ubuntu | 18.04 | noarch | libssl1.0.0-dbgsym | < 1.0.2n-1ubuntu5.13 | UNKNOWN |
Ubuntu | 18.04 | noarch | libssl1.0.0-udeb | < 1.0.2n-1ubuntu5.13 | UNKNOWN |
Ubuntu | 18.04 | noarch | openssl1.0 | < 1.0.2n-1ubuntu5.13 | UNKNOWN |
Ubuntu | 18.04 | noarch | openssl1.0-dbgsym | < 1.0.2n-1ubuntu5.13 | UNKNOWN |