{"vulnerability": "CVE-2023-49316", "sightings": [{"uuid": "661c28c6-ea60-4c61-b28d-28f9505fa427", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-49316", "type": "seen", "source": "https://t.me/ctinow/155554", "content": "https://ift.tt/napWIgi\nCVE-2023-49316 | phpseclib up to 3.0.33 Math/BinaryField.php denial of service", "creation_timestamp": "2023-12-17T09:37:25.000000Z"}, {"uuid": "f13b934f-ed39-4137-9ee6-ec53ac916eff", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-49316", "type": "seen", "source": "https://gist.github.com/alon710/5630cef7c3595002259238662d69e7b6", "content": "# CVE-2023-49316: CVE-2023-49316: Denial of Service via Unbounded Degree in phpseclib Binary Finite Fields\n\n&gt; **CVSS Score:** 7.5\n&gt; **Published:** 2026-05-08\n&gt; **Full Report:** https://cvereports.com/reports/CVE-2023-49316\n\n## Summary\nThe phpseclib cryptographic library version 3.x prior to 3.0.34 contains a Denial of Service (DoS) vulnerability in its mathematical field generation logic. When parsing maliciously crafted X.509 certificates or PKCS#8 private keys specifying Elliptic Curve parameters over a binary finite field, the library fails to validate the degree parameter. This flaw allows a remote attacker to force the PHP application to perform unbounded memory allocations, exhausting server resources and terminating the application worker process.\n\n## TL;DR\nphpseclib 3.x before 3.0.34 fails to bound the degree parameter when parsing Elliptic Curve keys over binary fields, allowing unauthenticated attackers to cause a fatal Out-Of-Memory (OOM) crash via a crafted ASN.1 payload.\n\n## Exploit Status: POC\n\n## Technical Details\n\n- **CWE ID**: CWE-834\n- **Attack Vector**: Network\n- **CVSS v3.1**: 7.5\n- **EPSS Score**: 0.15%\n- **Impact**: High (Availability)\n- **Exploit Status**: Proof-of-Concept\n- **CISA KEV**: Not Listed\n\n## Affected Systems\n\n- phpseclib 3.0.x\n- **phpseclib**: &gt;= 3.0.0, &lt; 3.0.34 (Fixed in: `3.0.34`)\n\n## Mitigation\n\n- Upgrade phpseclib to version 3.0.34 or later.\n- Implement application-level exception handling for OutOfBoundsException during cryptographic material parsing.\n- Enforce strict file size limits on endpoints accepting user-uploaded certificate files.\n\n**Remediation Steps:**\n1. Identify the project dependencies using composer: `composer show phpseclib/phpseclib`.\n2. Update the composer requirement to pull the latest 3.0.x patch: `composer require phpseclib/phpseclib:^3.0.34`.\n3. Execute `composer update`.\n4. Deploy the updated `composer.lock` file to production environments.\n5. Audit all calls to `EC::loadFormat()` to ensure proper `try...catch` blocks encompass the parsing logic.\n\n## References\n\n- [GitHub Security Advisory: GHSA-2f25-pfq3-c7h8](https://github.com/advisories/GHSA-2f25-pfq3-c7h8)\n- [Fix Commit in phpseclib](https://github.com/phpseclib/phpseclib/commit/964d78101a70305df33f442f5490f0adb3b7e77f)\n- [USENIX Paper: X.509DoS](https://www.usenix.org/system/files/usenixsecurity25-shi-bing.pdf)\n\n\n---\n*Generated by [CVEReports](https://cvereports.com/reports/CVE-2023-49316) - Automated Vulnerability Intelligence*", "creation_timestamp": "2026-05-09T06:10:29.000000Z"}]}