Severity
7.5HIGH
EPSS
78.4%
top 0.97%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedJun 12
Latest updateMay 13
Description
During key agreement in a TLS handshake using a DH(E) based ciphersuite a malicious server can send a very large prime value to the client. This will cause the client to spend an unreasonably long period of time generating a key for this prime resulting in a hang until the client has finished. This could be exploited in a Denial Of Service attack. Fixed in OpenSSL 1.1.0i-dev (Affected 1.1.0-1.1.0h). Fixed in OpenSSL 1.0.2p-dev (Affected 1.0.2-1.0.2o).
CVSS vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:HExploitability: 3.9 | Impact: 3.6
Affected Packages6 packages
▶CVEListV5openssl/opensslFixed in OpenSSL 1.0.2p-dev (Affected 1.0.2-1.0.2o), Fixed in OpenSSL 1.1.0i-dev (Affected 1.1.0-1.1.0h)+1
Also affects: Debian Linux 8.0, Ubuntu Linux 12.04, 14.04, 16.04, 17.10, 18.04
Patches
🔴Vulnerability Details
4GHSA▶
GHSA-497c-86pp-222m: During key agreement in a TLS handshake using a DH(E) based ciphersuite a malicious server can send a very large prime value to the client↗2022-05-13
OSV▶
CVE-2018-0732: During key agreement in a TLS handshake using a DH(E) based ciphersuite a malicious server can send a very large prime value to the client↗2018-06-12
📋Vendor Advisories
4💬Community
4Bugzilla▶
CVE-2018-0732 mingw-openssl: openssl: Malicious server can send large prime to client during DH(E) TLS handshake causing the client to hang [fedora-all]↗2018-06-14
Bugzilla▶
CVE-2018-0732 openssl: Malicious server can send large prime to client during DH(E) TLS handshake causing the client to hang↗2018-06-14
Bugzilla▶
CVE-2018-0732 openssl: Malicious server can send large prime to client during DH(E) TLS handshake causing the client to hang [fedora-all]↗2018-06-14