CVE-2023-3817:
Issue summary: Checking excessively long DH keys or parameters may be very slow.
Impact summary:...
5.3
CVSS Score
3.1
Basic Information
CVE ID
GHSA ID
EPSS Score
0.50362%
CWE
Published
7/31/2023
Updated
10/14/2024
KEV Status
No
Technology
-
Technical Details
CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The primary vulnerability lies in the DH_check
function, where it failed to adequately validate the size of the q
parameter relative to p
before performing computationally intensive operations. This was fixed by adding an early check for q
's size. The commits directly show this modification in crypto/dh/dh_check.c
. The vulnerability description explicitly names DH_check_ex
and EVP_PKEY_param_check
as also being affected because they internally call DH_check
. Therefore, these three functions are identified as vulnerable. The patches in the provided commits all modify DH_check
to mitigate this issue by adding a preliminary check on the q
parameter's size relative to p
.