{"dataType":"CVE_RECORD","cveMetadata":{"cveId":"CVE-2023-3817","assignerOrgId":"3a12439a-ef3a-4c79-92e6-6081a721f1e5","state":"PUBLISHED","assignerShortName":"openssl","dateReserved":"2023-07-21T08:47:25.638Z","datePublished":"2023-07-31T15:34:13.627Z","dateUpdated":"2025-05-05T15:53:49.014Z"},"containers":{"cna":{"affected":[{"defaultStatus":"unaffected","product":"OpenSSL","vendor":"OpenSSL","versions":[{"lessThan":"3.1.2","status":"affected","version":"3.1.0","versionType":"semver"},{"lessThan":"3.0.10","status":"affected","version":"3.0.0","versionType":"semver"},{"lessThan":"1.1.1v","status":"affected","version":"1.1.1","versionType":"custom"},{"lessThan":"1.0.2zi","status":"affected","version":"1.0.2","versionType":"custom"}]}],"credits":[{"lang":"en","type":"finder","user":"00000000-0000-4000-9000-000000000000","value":"Bernd Edlinger"},{"lang":"en","type":"remediation developer","user":"00000000-0000-4000-9000-000000000000","value":"Tomas Mraz"}],"datePublic":"2023-07-31T00:00:00.000Z","descriptions":[{"lang":"en","supportingMedia":[{"base64":false,"type":"text/html","value":"Issue summary: Checking excessively long DH keys or parameters may be very slow.<br><br>Impact summary: Applications that use the functions DH_check(), DH_check_ex()<br>or EVP_PKEY_param_check() to check a DH key or DH parameters may experience long<br>delays. Where the key or parameters that are being checked have been obtained<br>from an untrusted source this may lead to a Denial of Service.<br><br>The function DH_check() performs various checks on DH parameters. After fixing<br>CVE-2023-3446 it was discovered that a large q parameter value can also trigger<br>an overly long computation during some of these checks. A correct q value,<br>if present, cannot be larger than the modulus p parameter, thus it is<br>unnecessary to perform these checks if q is larger than p.<br><br>An application that calls DH_check() and supplies a key or parameters obtained<br>from an untrusted source could be vulnerable to a Denial of Service attack.<br><br>The function DH_check() is itself called by a number of other OpenSSL functions.<br>An application calling any of those other functions may similarly be affected.<br>The other functions affected by this are DH_check_ex() and<br>EVP_PKEY_param_check().<br><br>Also vulnerable are the OpenSSL dhparam and pkeyparam command line applications<br>when using the \"-check\" option.<br><br>The OpenSSL SSL/TLS implementation is not affected by this issue.<br><br>The OpenSSL 3.0 and 3.1 FIPS providers are not affected by this issue."}],"value":"Issue summary: Checking excessively long DH keys or parameters may be very slow.\n\nImpact summary: Applications that use the functions DH_check(), DH_check_ex()\nor EVP_PKEY_param_check() to check a DH key or DH parameters may experience long\ndelays. Where the key or parameters that are being checked have been obtained\nfrom an untrusted source this may lead to a Denial of Service.\n\nThe function DH_check() performs various checks on DH parameters. After fixing\nCVE-2023-3446 it was discovered that a large q parameter value can also trigger\nan overly long computation during some of these checks. A correct q value,\nif present, cannot be larger than the modulus p parameter, thus it is\nunnecessary to perform these checks if q is larger than p.\n\nAn application that calls DH_check() and supplies a key or parameters obtained\nfrom an untrusted source could be vulnerable to a Denial of Service attack.\n\nThe function DH_check() is itself called by a number of other OpenSSL functions.\nAn application calling any of those other functions may similarly be affected.\nThe other functions affected by this are DH_check_ex() and\nEVP_PKEY_param_check().\n\nAlso vulnerable are the OpenSSL dhparam and pkeyparam command line applications\nwhen using the \"-check\" option.\n\nThe OpenSSL SSL/TLS implementation is not affected by this issue.\n\nThe OpenSSL 3.0 and 3.1 FIPS providers are not affected by this issue."}],"metrics":[{"format":"other","other":{"content":{"text":"Low"},"type":"https://www.openssl.org/policies/secpolicy.html"}}],"problemTypes":[{"descriptions":[{"cweId":"CWE-606","description":"CWE-606 Unchecked Input for Loop Condition","lang":"en","type":"CWE"}]}],"providerMetadata":{"orgId":"3a12439a-ef3a-4c79-92e6-6081a721f1e5","shortName":"openssl","dateUpdated":"2024-10-14T14:55:48.907Z"},"references":[{"name":"OpenSSL Advisory","tags":["vendor-advisory"],"url":"https://www.openssl.org/news/secadv/20230731.txt"},{"name":"3.1.2 git commit","tags":["patch"],"url":"https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=6a1eb62c29db6cb5eec707f9338aee00f44e26f5"},{"name":"3.0.10 git commit","tags":["patch"],"url":"https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=9002fd07327a91f35ba6c1307e71fa6fd4409b7f"},{"name":"1.1.1v git commit","tags":["patch"],"url":"https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=91ddeba0f2269b017dc06c46c993a788974b1aa5"},{"name":"1.0.2zi patch (premium)","tags":["patch"],"url":"https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=869ad69aadd985c7b8ca6f4e5dd0eb274c9f3644"}],"source":{"discovery":"UNKNOWN"},"title":"Excessive time spent checking DH q parameter value","x_generator":{"engine":"Vulnogram 0.1.0-dev"}},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-02T07:08:50.496Z"},"title":"CVE Program Container","references":[{"name":"OpenSSL Advisory","tags":["vendor-advisory","x_transferred"],"url":"https://www.openssl.org/news/secadv/20230731.txt"},{"name":"3.1.2 git commit","tags":["patch","x_transferred"],"url":"https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=6a1eb62c29db6cb5eec707f9338aee00f44e26f5"},{"name":"3.0.10 git commit","tags":["patch","x_transferred"],"url":"https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=9002fd07327a91f35ba6c1307e71fa6fd4409b7f"},{"name":"1.1.1v git commit","tags":["patch","x_transferred"],"url":"https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=91ddeba0f2269b017dc06c46c993a788974b1aa5"},{"name":"1.0.2zi patch (premium)","tags":["patch","x_transferred"],"url":"https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=869ad69aadd985c7b8ca6f4e5dd0eb274c9f3644"},{"url":"http://seclists.org/fulldisclosure/2023/Jul/43","tags":["x_transferred"]},{"url":"http://www.openwall.com/lists/oss-security/2023/07/31/1","tags":["x_transferred"]},{"url":"https://lists.debian.org/debian-lts-announce/2023/08/msg00019.html","tags":["x_transferred"]},{"url":"https://security.netapp.com/advisory/ntap-20230818-0014/","tags":["x_transferred"]},{"url":"http://www.openwall.com/lists/oss-security/2023/09/22/9","tags":["x_transferred"]},{"url":"http://www.openwall.com/lists/oss-security/2023/09/22/11","tags":["x_transferred"]},{"url":"https://security.netapp.com/advisory/ntap-20231027-0008/","tags":["x_transferred"]},{"url":"http://www.openwall.com/lists/oss-security/2023/11/06/2","tags":["x_transferred"]},{"url":"https://security.gentoo.org/glsa/202402-08","tags":["x_transferred"]},{"url":"https://security.netapp.com/advisory/ntap-20240621-0006/","tags":["x_transferred"]}]},{"metrics":[{"cvssV3_1":{"scope":"UNCHANGED","version":"3.1","baseScore":5.3,"attackVector":"NETWORK","baseSeverity":"MEDIUM","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L","integrityImpact":"NONE","userInteraction":"NONE","attackComplexity":"LOW","availabilityImpact":"LOW","privilegesRequired":"NONE","confidentialityImpact":"NONE"}},{"other":{"type":"ssvc","content":{"timestamp":"2025-04-23T13:26:20.624850Z","id":"CVE-2023-3817","options":[{"Exploitation":"none"},{"Automatable":"yes"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2025-05-05T15:53:49.014Z"}}]},"dataVersion":"5.1"}