CVE-2023-3817
Publication date 31 July 2023
Last updated 24 July 2024
Ubuntu priority
Cvss 3 Severity Score
Issue summary: Checking excessively long DH keys or parameters may be very slow. Impact summary: Applications that use the functions DH_check(), DH_check_ex() or EVP_PKEY_param_check() to check a DH key or DH parameters may experience long delays. Where the key or parameters that are being checked have been obtained from an untrusted source this may lead to a Denial of Service. The function DH_check() performs various checks on DH parameters. After fixing CVE-2023-3446 it was discovered that a large q parameter value can also trigger an overly long computation during some of these checks. A correct q value, if present, cannot be larger than the modulus p parameter, thus it is unnecessary to perform these checks if q is larger than p. An application that calls DH_check() and supplies a key or parameters obtained from an untrusted source could be vulnerable to a Denial of Service attack. The function DH_check() is itself called by a number of other OpenSSL functions. An application calling any of those other functions may similarly be affected. The other functions affected by this are DH_check_ex() and EVP_PKEY_param_check(). Also vulnerable are the OpenSSL dhparam and pkeyparam command line applications when using the "-check" option. The OpenSSL SSL/TLS implementation is not affected by this issue. The OpenSSL 3.0 and 3.1 FIPS providers are not affected by this issue.
Why is this CVE low priority?
Upstream rates this as having low severity
Status
Package | Ubuntu Release | Status |
---|---|---|
edk2 | 24.04 LTS noble |
Vulnerable
|
22.04 LTS jammy |
Vulnerable
|
|
20.04 LTS focal |
Vulnerable
|
|
18.04 LTS bionic |
Needs evaluation
|
|
16.04 LTS xenial |
Needs evaluation
|
|
14.04 LTS trusty | Ignored end of standard support | |
nodejs | 24.04 LTS noble |
Not affected
|
22.04 LTS jammy |
Vulnerable
|
|
20.04 LTS focal |
Not affected
|
|
18.04 LTS bionic |
Needs evaluation
|
|
16.04 LTS xenial |
Needs evaluation
|
|
14.04 LTS trusty |
Not affected
|
|
openssl | 24.04 LTS noble |
Not affected
|
22.04 LTS jammy |
Fixed 3.0.2-0ubuntu1.12
|
|
20.04 LTS focal |
Fixed 1.1.1f-1ubuntu2.20
|
|
18.04 LTS bionic |
Fixed 1.1.1-1ubuntu2.1~18.04.23+esm3
|
|
16.04 LTS xenial |
Fixed 1.0.2g-1ubuntu4.20+esm10
|
|
14.04 LTS trusty |
Not affected
|
|
openssl1.0 | 24.04 LTS noble | Not in release |
22.04 LTS jammy | Not in release | |
20.04 LTS focal | Not in release | |
18.04 LTS bionic |
Fixed 1.0.2n-1ubuntu5.13+esm1
|
|
16.04 LTS xenial | Not in release | |
14.04 LTS trusty | Not in release |
Get expanded security coverage with Ubuntu Pro
Reduce your average CVE exposure time from 98 days to 1 day with expanded CVE patching, ten-years security maintenance and optional support for the full stack of open-source applications. Free for personal use.
Get Ubuntu ProSeverity score breakdown
Parameter | Value |
---|---|
Base score | 5.3 · Medium |
Attack vector | Network |
Attack complexity | Low |
Privileges required | None |
User interaction | None |
Scope | Unchanged |
Confidentiality | None |
Integrity impact | None |
Availability impact | Low |
Vector | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L |
References
Related Ubuntu Security Notices (USN)
- USN-6435-1
- OpenSSL vulnerabilities
- 18 October 2023
- USN-6450-1
- OpenSSL vulnerabilities
- 24 October 2023
- USN-6435-2
- OpenSSL vulnerabilities
- 25 October 2023
- USN-6709-1
- OpenSSL vulnerabilities
- 21 March 2024