Lucene search

K
ubuntucveUbuntu.comUB:CVE-2022-40735
HistoryNov 14, 2022 - 12:00 a.m.

CVE-2022-40735

2022-11-1400:00:00
ubuntu.com
ubuntu.com
31
diffie-hellman
key agreement protocol
long exponents
server-side vulnerability
resource consumption
modular-exponentiation calculations
tls
ssh
ike
cve-2022-40735

5 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:N/I:N/A:P

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

7.2 High

AI Score

Confidence

High

0.011 Low

EPSS

Percentile

84.3%

The Diffie-Hellman Key Agreement Protocol allows use of long exponents that
arguably make certain calculations unnecessarily expensive, because the
1996 van Oorschot and Wiener paper found that “(appropriately) short
exponents” can be used when there are adequate subgroup constraints, and
these short exponents can lead to less expensive calculations than for long
exponents. This issue is different from CVE-2002-20001 because it is based
on an observation about exponent size, rather than an observation about
numbers that are not public keys. The specific situations in which
calculation expense would constitute a server-side vulnerability depend on
the protocol (e.g., TLS, SSH, or IKE) and the DHE implementation details.
In general, there might be an availability concern because of server-side
resource consumption from DHE modular-exponentiation calculations. Finally,
it is possible for an attacker to exploit this vulnerability and
CVE-2002-20001 together.

Notes

Author Note
alexmurray It would appear upstream openssl fixed this in 3.1.0 via https://github.com/openssl/openssl/pull/18480
mdeslaur This was backported to 3.0.6 via https://github.com/openssl/openssl/pull/18793 doesn’t affect 1.x
OSVersionArchitecturePackageVersionFilename
ubuntu22.04noarchnodejs< anyUNKNOWN
ubuntu22.04noarchopenssl< 3.0.2-0ubuntu1.16UNKNOWN

References

5 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:N/I:N/A:P

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

7.2 High

AI Score

Confidence

High

0.011 Low

EPSS

Percentile

84.3%