Required CVE Record Information
Description
During key agreement in a TLS handshake using a DH(E) based ciphersuite a malicious server can send a very large prime value to the client. This will cause the client to spend an unreasonably long period of time generating a key for this prime resulting in a hang until the client has finished. This could be exploited in a Denial Of Service attack. Fixed in OpenSSL 1.1.0i-dev (Affected 1.1.0-1.1.0h). Fixed in OpenSSL 1.0.2p-dev (Affected 1.0.2-1.0.2o).
Credits
- Guido Vranken
References 37 Total
- lists.debian.org: [debian-lts-announce] 20180728 [SECURITY] [DLA 1449-1] openssl security update mailing-list
- securityfocus.com: 104442 vdb-entry
- debian.org: DSA-4355 vendor-advisory
- access.redhat.com: RHSA-2018:2552 vendor-advisory
- security.gentoo.org: GLSA-201811-03 vendor-advisory
- usn.ubuntu.com: USN-3692-2 vendor-advisory
- access.redhat.com: RHSA-2018:2553 vendor-advisory
- access.redhat.com: RHSA-2018:3505 vendor-advisory
- usn.ubuntu.com: USN-3692-1 vendor-advisory
- access.redhat.com: RHSA-2018:3221 vendor-advisory
- debian.org: DSA-4348 vendor-advisory
- securitytracker.com: 1041090 vdb-entry
- access.redhat.com: RHSA-2019:1297 vendor-advisory
- access.redhat.com: RHSA-2019:1296 vendor-advisory
- access.redhat.com: RHSA-2019:1543 vendor-advisory
- lists.fedoraproject.org: FEDORA-2019-db06efdea1 vendor-advisory
- lists.fedoraproject.org: FEDORA-2019-00c25b9379 vendor-advisory
- lists.fedoraproject.org: FEDORA-2019-9a0a7c0986 vendor-advisory
- https://www.oracle.com/security-alerts/cpuapr2020.html
- http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html
- https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html
- https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html
- https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html
- https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html
- https://www.oracle.com/security-alerts/cpujan2021.html
- https://www.tenable.com/security/tns-2018-14
- https://securityadvisories.paloaltonetworks.com/Home/Detail/133
- https://www.tenable.com/security/tns-2018-13
- https://www.tenable.com/security/tns-2018-17
- https://www.tenable.com/security/tns-2018-12
- https://security.netapp.com/advisory/ntap-20181105-0001/
- https://nodejs.org/en/blog/vulnerability/august-2018-security-releases/
- https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=3984ef0b72831da8b3ece4745cac4f8575b19098
- https://www.openssl.org/news/secadv/20180612.txt
- https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=ea7abeeabf92b7aca160bdd0208636d4da69f4f4
- https://security.netapp.com/advisory/ntap-20190118-0002/
- https://cert-portal.siemens.com/productcert/pdf/ssa-419820.pdf
Updated:
This container includes required additional information provided by the CVE Program for this vulnerability.
References 37 Total
- lists.debian.org: [debian-lts-announce] 20180728 [SECURITY] [DLA 1449-1] openssl security update mailing-listx_transferred
- securityfocus.com: 104442 vdb-entryx_transferred
- debian.org: DSA-4355 vendor-advisoryx_transferred
- access.redhat.com: RHSA-2018:2552 vendor-advisoryx_transferred
- security.gentoo.org: GLSA-201811-03 vendor-advisoryx_transferred
- usn.ubuntu.com: USN-3692-2 vendor-advisoryx_transferred
- access.redhat.com: RHSA-2018:2553 vendor-advisoryx_transferred
- access.redhat.com: RHSA-2018:3505 vendor-advisoryx_transferred
- usn.ubuntu.com: USN-3692-1 vendor-advisoryx_transferred
- access.redhat.com: RHSA-2018:3221 vendor-advisoryx_transferred
- debian.org: DSA-4348 vendor-advisoryx_transferred
- securitytracker.com: 1041090 vdb-entryx_transferred
- access.redhat.com: RHSA-2019:1297 vendor-advisoryx_transferred
- access.redhat.com: RHSA-2019:1296 vendor-advisoryx_transferred
- access.redhat.com: RHSA-2019:1543 vendor-advisoryx_transferred
- lists.fedoraproject.org: FEDORA-2019-db06efdea1 vendor-advisoryx_transferred
- lists.fedoraproject.org: FEDORA-2019-00c25b9379 vendor-advisoryx_transferred
- lists.fedoraproject.org: FEDORA-2019-9a0a7c0986 vendor-advisoryx_transferred
- https://www.oracle.com/security-alerts/cpuapr2020.html x_transferred
- http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html x_transferred
- https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html x_transferred
- https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html x_transferred
- https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html x_transferred
- https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html x_transferred
- https://www.oracle.com/security-alerts/cpujan2021.html x_transferred
- https://www.tenable.com/security/tns-2018-14 x_transferred
- https://securityadvisories.paloaltonetworks.com/Home/Detail/133 x_transferred
- https://www.tenable.com/security/tns-2018-13 x_transferred
- https://www.tenable.com/security/tns-2018-17 x_transferred
- https://www.tenable.com/security/tns-2018-12 x_transferred
- https://security.netapp.com/advisory/ntap-20181105-0001/ x_transferred
- https://nodejs.org/en/blog/vulnerability/august-2018-security-releases/ x_transferred
- https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=3984ef0b72831da8b3ece4745cac4f8575b19098 x_transferred
- https://www.openssl.org/news/secadv/20180612.txt x_transferred
- https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=ea7abeeabf92b7aca160bdd0208636d4da69f4f4 x_transferred
- https://security.netapp.com/advisory/ntap-20190118-0002/ x_transferred
- https://cert-portal.siemens.com/productcert/pdf/ssa-419820.pdf x_transferred