Miggo Logo

CVE-2023-3817:
Issue summary: Checking excessively long DH keys or parameters may be very slow. Impact summary:...

5.3

CVSS Score
3.1

Basic Information

EPSS Score
0.50362%
Published
7/31/2023
Updated
10/14/2024
KEV Status
No
Technology
-

Technical Details

CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The primary vulnerability lies in the DH_check function, where it failed to adequately validate the size of the q parameter relative to p before performing computationally intensive operations. This was fixed by adding an early check for q's size. The commits directly show this modification in crypto/dh/dh_check.c. The vulnerability description explicitly names DH_check_ex and EVP_PKEY_param_check as also being affected because they internally call DH_check. Therefore, these three functions are identified as vulnerable. The patches in the provided commits all modify DH_check to mitigate this issue by adding a preliminary check on the q parameter's size relative to p.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

Issu* summ*ry: ****kin* *x**ssiv*ly lon* ** k*ys or p*r*m*t*rs m*y ** v*ry slow. Imp**t summ*ry: *ppli**tions t**t us* t** *un*tions **_****k(), **_****k_*x() or *VP_PK*Y_p*r*m_****k() to ****k * ** k*y or ** p*r*m*t*rs m*y *xp*ri*n** lon* **l*ys. W

Reasoning

T** prim*ry vuln*r**ility li*s in t** `**_****k` *un*tion, w**r* it **il** to ***qu*t*ly v*li**t* t** siz* o* t** `q` p*r*m*t*r r*l*tiv* to `p` ***or* p*r*ormin* *omput*tion*lly int*nsiv* op*r*tions. T*is w*s *ix** *y ***in* *n **rly ****k *or `q`'s