CVE-2023-3817: Issue summary: Checking excessively long DH keys or parameters may be very slow. Impact summary:...
5.3
CVSS Score
3.1
Basic Information
CVE ID
GHSA ID
EPSS Score
0.50362%
CWE
Published
7/31/2023
Updated
10/14/2024
KEV Status
No
Technology
-
Technical Details
CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The primary vulnerability lies in the DH_check function, where it failed to adequately validate the size of the q parameter relative to p before performing computationally intensive operations. This was fixed by adding an early check for q's size. The commits directly show this modification in crypto/dh/dh_check.c. The vulnerability description explicitly names DH_check_ex and EVP_PKEY_param_check as also being affected because they internally call DH_check. Therefore, these three functions are identified as vulnerable. The patches in the provided commits all modify DH_check to mitigate this issue by adding a preliminary check on the q parameter's size relative to p.