Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2022-40735 (GCVE-0-2022-40735)
Vulnerability from cvelistv5
- n/a
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T12:28:41.552Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://github.com/mozilla/ssl-config-generator/issues/162" }, { "tags": [ "x_transferred" ], "url": "https://gist.github.com/c0r0n3r/9455ddcab985c50fd1912eabf26e058b" }, { "tags": [ "x_transferred" ], "url": "https://link.springer.com/content/pdf/10.1007/3-540-68339-9_29.pdf" }, { "tags": [ "x_transferred" ], "url": "https://www.researchgate.net/profile/Anton-Stiglic-2/publication/2401745_Security_Issues_in_the_Diffie-Hellman_Key_Agreement_Protocol/links/546c144f0cf20dedafd53e7e/Security-Issues-in-the-Diffie-Hellman-Key-Agreement-Protocol.pdf" }, { "tags": [ "x_transferred" ], "url": "https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-57pt1r5.pdf" }, { "tags": [ "x_transferred" ], "url": "https://www.rfc-editor.org/rfc/rfc4419" }, { "tags": [ "x_transferred" ], "url": "https://www.rfc-editor.org/rfc/rfc5114#section-4" }, { "tags": [ "x_transferred" ], "url": "https://www.rfc-editor.org/rfc/rfc7919#section-5.2" }, { "tags": [ "x_transferred" ], "url": "https://raw.githubusercontent.com/CVEProject/cvelist/9d7fbbcabd3f44cfedc9e8807757d31ece85a2c6/2022/40xxx/CVE-2022-40735.json" }, { "tags": [ "x_transferred" ], "url": "https://www.rfc-editor.org/rfc/rfc3526" }, { "tags": [ "x_transferred" ], "url": "https://dheatattack.gitlab.io/" }, { "tags": [ "x_transferred" ], "url": "https://ieeexplore.ieee.org/document/10374117" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "The Diffie-Hellman Key Agreement Protocol allows use of long exponents that arguably make certain calculations unnecessarily expensive, because the 1996 van Oorschot and Wiener paper found that \"(appropriately) short exponents\" can be used when there are adequate subgroup constraints, and these short exponents can lead to less expensive calculations than for long exponents. This issue is different from CVE-2002-20001 because it is based on an observation about exponent size, rather than an observation about numbers that are not public keys. The specific situations in which calculation expense would constitute a server-side vulnerability depend on the protocol (e.g., TLS, SSH, or IKE) and the DHE implementation details. In general, there might be an availability concern because of server-side resource consumption from DHE modular-exponentiation calculations. Finally, it is possible for an attacker to exploit this vulnerability and CVE-2002-20001 together." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2024-04-23T06:49:41.370072", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "url": "https://github.com/mozilla/ssl-config-generator/issues/162" }, { "url": "https://gist.github.com/c0r0n3r/9455ddcab985c50fd1912eabf26e058b" }, { "url": "https://link.springer.com/content/pdf/10.1007/3-540-68339-9_29.pdf" }, { "url": "https://www.researchgate.net/profile/Anton-Stiglic-2/publication/2401745_Security_Issues_in_the_Diffie-Hellman_Key_Agreement_Protocol/links/546c144f0cf20dedafd53e7e/Security-Issues-in-the-Diffie-Hellman-Key-Agreement-Protocol.pdf" }, { "url": "https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-57pt1r5.pdf" }, { "url": "https://www.rfc-editor.org/rfc/rfc4419" }, { "url": "https://www.rfc-editor.org/rfc/rfc5114#section-4" }, { "url": "https://www.rfc-editor.org/rfc/rfc7919#section-5.2" }, { "url": "https://raw.githubusercontent.com/CVEProject/cvelist/9d7fbbcabd3f44cfedc9e8807757d31ece85a2c6/2022/40xxx/CVE-2022-40735.json" }, { "url": "https://www.rfc-editor.org/rfc/rfc3526" }, { "url": "https://dheatattack.gitlab.io/" }, { "url": "https://ieeexplore.ieee.org/document/10374117" } ] } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2022-40735", "datePublished": "2022-11-14T00:00:00", "dateReserved": "2022-09-15T00:00:00", "dateUpdated": "2024-08-03T12:28:41.552Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "vulnerability-lookup:meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2022-40735\",\"sourceIdentifier\":\"cve@mitre.org\",\"published\":\"2022-11-14T23:15:11.423\",\"lastModified\":\"2024-11-21T07:21:56.900\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"The Diffie-Hellman Key Agreement Protocol allows use of long exponents that arguably make certain calculations unnecessarily expensive, because the 1996 van Oorschot and Wiener paper found that \\\"(appropriately) short exponents\\\" can be used when there are adequate subgroup constraints, and these short exponents can lead to less expensive calculations than for long exponents. This issue is different from CVE-2002-20001 because it is based on an observation about exponent size, rather than an observation about numbers that are not public keys. The specific situations in which calculation expense would constitute a server-side vulnerability depend on the protocol (e.g., TLS, SSH, or IKE) and the DHE implementation details. In general, there might be an availability concern because of server-side resource consumption from DHE modular-exponentiation calculations. Finally, it is possible for an attacker to exploit this vulnerability and CVE-2002-20001 together.\"},{\"lang\":\"es\",\"value\":\"Diffie-Hellman Key Agreement Protocol permite el uso de exponentes largos que posiblemente hacen que ciertos c\u00e1lculos sean innecesariamente costosos, porque el art\u00edculo de van Oorschot y Wiener de 1996 encontr\u00f3 que se pueden usar \\\"exponentes (apropiadamente) cortos\\\" cuando existen restricciones de subgrupo adecuadas, y estos exponentes cortos pueden conducir a c\u00e1lculos menos costosos que los de exponentes largos. Este problema es diferente de CVE-2002-20001, porque se basa en una observaci\u00f3n sobre el tama\u00f1o del exponente, en lugar de una observaci\u00f3n sobre n\u00fameros que no son claves p\u00fablicas. Las situaciones espec\u00edficas en las que el gasto de c\u00e1lculo constituir\u00eda una vulnerabilidad del lado del servidor dependen del protocolo (por ejemplo, TLS, SSH o IKE) y los detalles de implementaci\u00f3n de DHE. En general, puede haber un problema de disponibilidad debido al consumo de recursos del lado del servidor a partir de los c\u00e1lculos de exponenciaci\u00f3n modular de DHE. Finalmente, es posible que un atacante aproveche esta vulnerabilidad y CVE-2002-20001 juntos.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H\",\"baseScore\":7.5,\"baseSeverity\":\"HIGH\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":3.9,\"impactScore\":3.6}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-400\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:diffie-hellman_key_exchange_project:diffie-hellman_key_exchange:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"43F56DA8-0635-41E8-B91C-485695B587AD\"}]}]}],\"references\":[{\"url\":\"https://dheatattack.gitlab.io/\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://gist.github.com/c0r0n3r/9455ddcab985c50fd1912eabf26e058b\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://github.com/mozilla/ssl-config-generator/issues/162\",\"source\":\"cve@mitre.org\",\"tags\":[\"Issue Tracking\",\"Third Party Advisory\"]},{\"url\":\"https://ieeexplore.ieee.org/document/10374117\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://link.springer.com/content/pdf/10.1007/3-540-68339-9_29.pdf\",\"source\":\"cve@mitre.org\",\"tags\":[\"Technical Description\",\"Third Party Advisory\"]},{\"url\":\"https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-57pt1r5.pdf\",\"source\":\"cve@mitre.org\",\"tags\":[\"Technical Description\",\"Third Party Advisory\",\"US Government Resource\"]},{\"url\":\"https://raw.githubusercontent.com/CVEProject/cvelist/9d7fbbcabd3f44cfedc9e8807757d31ece85a2c6/2022/40xxx/CVE-2022-40735.json\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://www.researchgate.net/profile/Anton-Stiglic-2/publication/2401745_Security_Issues_in_the_Diffie-Hellman_Key_Agreement_Protocol/links/546c144f0cf20dedafd53e7e/Security-Issues-in-the-Diffie-Hellman-Key-Agreement-Protocol.pdf\",\"source\":\"cve@mitre.org\",\"tags\":[\"Technical Description\",\"Third Party Advisory\"]},{\"url\":\"https://www.rfc-editor.org/rfc/rfc3526\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://www.rfc-editor.org/rfc/rfc4419\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://www.rfc-editor.org/rfc/rfc5114#section-4\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://www.rfc-editor.org/rfc/rfc7919#section-5.2\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://dheatattack.gitlab.io/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://gist.github.com/c0r0n3r/9455ddcab985c50fd1912eabf26e058b\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://github.com/mozilla/ssl-config-generator/issues/162\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Issue Tracking\",\"Third Party Advisory\"]},{\"url\":\"https://ieeexplore.ieee.org/document/10374117\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://link.springer.com/content/pdf/10.1007/3-540-68339-9_29.pdf\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Technical Description\",\"Third Party Advisory\"]},{\"url\":\"https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-57pt1r5.pdf\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Technical Description\",\"Third Party Advisory\",\"US Government Resource\"]},{\"url\":\"https://raw.githubusercontent.com/CVEProject/cvelist/9d7fbbcabd3f44cfedc9e8807757d31ece85a2c6/2022/40xxx/CVE-2022-40735.json\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://www.researchgate.net/profile/Anton-Stiglic-2/publication/2401745_Security_Issues_in_the_Diffie-Hellman_Key_Agreement_Protocol/links/546c144f0cf20dedafd53e7e/Security-Issues-in-the-Diffie-Hellman-Key-Agreement-Protocol.pdf\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Technical Description\",\"Third Party Advisory\"]},{\"url\":\"https://www.rfc-editor.org/rfc/rfc3526\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://www.rfc-editor.org/rfc/rfc4419\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://www.rfc-editor.org/rfc/rfc5114#section-4\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://www.rfc-editor.org/rfc/rfc7919#section-5.2\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}]}}" } }
WID-SEC-W-2024-3056
Vulnerability from csaf_certbund
Notes
{ "document": { "aggregate_severity": { "text": "mittel" }, "category": "csaf_base", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "de-DE", "notes": [ { "category": "legal_disclaimer", "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen." }, { "category": "description", "text": "Transport Layer Security (TLS) ist ein hybrides Verschl\u00fcsselungsprotokoll zur Daten\u00fcbertragung im Internet.\r\nOpenSSL ist eine im Quelltext frei verf\u00fcgbare Bibliothek, die Secure Sockets Layer (SSL) und Transport Layer Security (TLS) implementiert.\r\nGnuTLS (GNU Transport Layer Security Library) ist eine im Quelltext frei verf\u00fcgbare Bibliothek, die Secure Sockets Layer (SSL) und Transport Layer Security (TLS) implementiert.\r\nOpenVPN ist eine Open Source Software zum Aufbau eines Virtuellen Privaten Netzwerkes (VPN) \u00fcber eine verschl\u00fcsselte TLS-Verbindung. Zur Verschl\u00fcsselung werden die Bibliotheken des Programmes OpenSSL benutzt.\r\nOpenJDK ist eine Java Umgebung, die unter der GPLv2 ver\u00f6ffentlicht wird.", "title": "Produktbeschreibung" }, { "category": "summary", "text": "Ein entfernter anonymer Angreifer kann mehrere Schwachstellen in verschiedenen Diffie-Hellman Implementierungen ausnutzen, um einen Denial-of-Service-Zustand zu erzeugen.", "title": "Angriff" }, { "category": "general", "text": "- Sonstiges\n- UNIX\n- Windows", "title": "Betroffene Betriebssysteme" } ], "publisher": { "category": "other", "contact_details": "csaf-provider@cert-bund.de", "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik", "namespace": "https://www.bsi.bund.de" }, "references": [ { "category": "self", "summary": "WID-SEC-W-2024-3056 - CSAF Version", "url": "https://wid.cert-bund.de/.well-known/csaf/white/2024/wid-sec-w-2024-3056.json" }, { "category": "self", "summary": "WID-SEC-2024-3056 - Portal Version", "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2024-3056" }, { "category": "external", "summary": "NIST Vulnerability Database vom 2024-09-30", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-41996" }, { "category": "external", "summary": "NIST Vulnerability Database vom 2024-09-30", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-40735" }, { "category": "external", "summary": "NIST Vulnerability Database vom 2024-09-30", "url": "https://nvd.nist.gov/vuln/detail/CVE-2002-20001" }, { "category": "external", "summary": "D(HE)at Attack Website vom 2024-09-30", "url": "https://dheatattack.gitlab.io/details/" }, { "category": "external", "summary": "D(HE)at Attack Website vom 2024-09-30", "url": "https://dheatattack.gitlab.io/faq/" }, { "category": "external", "summary": "D(HE)at Attack Website vom 2024-09-30", "url": "https://dheatattack.gitlab.io/mitigations/" }, { "category": "external", "summary": "Cybersecurity News vom 2024-09-30", "url": "https://cybersecuritynews.com/dheat-attack/" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:3501-1 vom 2024-10-01", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-October/019541.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:3501-1 vom 2024-10-01", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/WX2JI3MUD4LZ3SGGRVYKP45PM2L4E7A2/" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:3501-1 vom 2024-10-01", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/WX2JI3MUD4LZ3SGGRVYKP45PM2L4E7A2/" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:3525-1 vom 2024-10-04", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/WH2LICAK2VLI5365FJFTS2QU4XOMKFF5/" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:3525-1 vom 2024-10-04", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/WH2LICAK2VLI5365FJFTS2QU4XOMKFF5/" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:3766-1 vom 2024-10-29", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/2YIIP7KVUHLQSOVN6ND3S7Y63XWGGD3T/" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:3766-1 vom 2024-10-29", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2YIIP7KVUHLQSOVN6ND3S7Y63XWGGD3T/" }, { "category": "external", "summary": "F5 Security Advisory K000148343 vom 2024-10-31", "url": "https://my.f5.com/manage/s/article/K000148343" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:3871-1 vom 2024-11-01", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-November/019759.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:20081-1 vom 2025-06-04", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021234.html" }, { "category": "external", "summary": "ExtremeNetworks Vulnerability Notice SA-2025-065 vom 2025-07-29", "url": "https://extreme-networks.my.site.com/ExtrArticleDetail?an=000128178" } ], "source_lang": "en-US", "title": "Diffie-Hellman Implementierungen: Mehrere Schwachstellen erm\u00f6glichen Denial of Service", "tracking": { "current_release_date": "2025-07-29T22:00:00.000+00:00", "generator": { "date": "2025-07-30T09:10:42.963+00:00", "engine": { "name": "BSI-WID", "version": "1.4.0" } }, "id": "WID-SEC-W-2024-3056", "initial_release_date": "2024-09-30T22:00:00.000+00:00", "revision_history": [ { "date": "2024-09-30T22:00:00.000+00:00", "number": "1", "summary": "Initiale Fassung" }, { "date": "2024-10-01T22:00:00.000+00:00", "number": "2", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2024-10-06T22:00:00.000+00:00", "number": "3", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2024-10-28T23:00:00.000+00:00", "number": "4", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2024-10-30T23:00:00.000+00:00", "number": "5", "summary": "Neue Updates von F5 aufgenommen" }, { "date": "2024-11-03T23:00:00.000+00:00", "number": "6", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2025-06-04T22:00:00.000+00:00", "number": "7", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2025-07-29T22:00:00.000+00:00", "number": "8", "summary": "Neue Updates von ExtremeNetworks aufgenommen" } ], "status": "final", "version": "8" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version_range", "name": "\u003c10.8r3", "product": { "name": "Extreme Networks HiveOS \u003c10.8r3", "product_id": "T045721" } }, { "category": "product_version", "name": "10.8r3", "product": { "name": "Extreme Networks HiveOS 10.8r3", "product_id": "T045721-fixed", "product_identification_helper": { "cpe": "cpe:/o:extremenetworks:hiveos:10.8r3" } } } ], "category": "product_name", "name": "HiveOS" } ], "category": "vendor", "name": "Extreme Networks" }, { "branches": [ { "category": "product_name", "name": "F5 BIG-IP", "product": { "name": "F5 BIG-IP", "product_id": "T001663", "product_identification_helper": { "cpe": "cpe:/a:f5:big-ip:-" } } } ], "category": "vendor", "name": "F5" }, { "branches": [ { "branches": [ { "category": "product_version_range", "name": "\u003e=3.5.6", "product": { "name": "Open Source GnuTLS \u003e=3.5.6", "product_id": "T037921" } }, { "category": "product_version_range", "name": "\u003e=3.5.6", "product": { "name": "Open Source GnuTLS \u003e=3.5.6", "product_id": "T037921-fixed" } }, { "category": "product_version_range", "name": "\u003e=3.6.3", "product": { "name": "Open Source GnuTLS \u003e=3.6.3", "product_id": "T037922" } }, { "category": "product_version_range", "name": "\u003e=3.6.3", "product": { "name": "Open Source GnuTLS \u003e=3.6.3", "product_id": "T037922-fixed" } } ], "category": "product_name", "name": "GnuTLS" }, { "branches": [ { "category": "product_version_range", "name": "\u003c=17.0.5", "product": { "name": "Open Source OpenJDK \u003c=17.0.5", "product_id": "T037924" } }, { "category": "product_version_range", "name": "\u003c=17.0.5", "product": { "name": "Open Source OpenJDK \u003c=17.0.5", "product_id": "T037924-fixed" } } ], "category": "product_name", "name": "OpenJDK" }, { "branches": [ { "category": "product_version_range", "name": "\u003e=3.0", "product": { "name": "Open Source OpenSSL \u003e=3.0", "product_id": "T037920" } }, { "category": "product_version_range", "name": "\u003e=3.0", "product": { "name": "Open Source OpenSSL \u003e=3.0", "product_id": "T037920-fixed" } } ], "category": "product_name", "name": "OpenSSL" }, { "category": "product_name", "name": "Open Source OpenVPN", "product": { "name": "Open Source OpenVPN", "product_id": "T037926", "product_identification_helper": { "cpe": "cpe:/a:openvpn:openvpn:-" } } } ], "category": "vendor", "name": "Open Source" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux", "product": { "name": "SUSE Linux", "product_id": "T002207", "product_identification_helper": { "cpe": "cpe:/o:suse:suse_linux:-" } } } ], "category": "vendor", "name": "SUSE" }, { "branches": [ { "category": "product_name", "name": "Specification TLS", "product": { "name": "Specification TLS", "product_id": "T037919", "product_identification_helper": { "cpe": "cpe:/a:open_source:tls1:-" } } } ], "category": "vendor", "name": "Specification" } ] }, "vulnerabilities": [ { "cve": "CVE-2002-20001", "product_status": { "known_affected": [ "T045721", "T037926", "T002207", "T001663", "T037919" ], "last_affected": [ "T037924" ] }, "release_date": "2024-09-30T22:00:00.000+00:00", "title": "CVE-2002-20001" }, { "cve": "CVE-2022-40735", "product_status": { "known_affected": [ "T045721", "T037926", "T002207", "T001663", "T037919" ], "last_affected": [ "T037924" ] }, "release_date": "2024-09-30T22:00:00.000+00:00", "title": "CVE-2022-40735" }, { "cve": "CVE-2024-41996", "product_status": { "known_affected": [ "T045721", "T037926", "T002207", "T001663", "T037919" ], "last_affected": [ "T037924" ] }, "release_date": "2024-09-30T22:00:00.000+00:00", "title": "CVE-2024-41996" } ] }
WID-SEC-W-2023-1886
Vulnerability from csaf_certbund
Notes
{ "document": { "aggregate_severity": { "text": "hoch" }, "category": "csaf_base", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "de-DE", "notes": [ { "category": "legal_disclaimer", "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen." }, { "category": "description", "text": "Sophos UTM ist eine Netzwerk-Appliance mit diversen Sicherheitsfunktionen (z.B. Firewall, Antivirus, Contentfilter).", "title": "Produktbeschreibung" }, { "category": "summary", "text": "Ein entfernter, authentisierter Angreifer kann mehrere Schwachstellen in Sophos Unified Threat Management (UTM) Software ausnutzen, um beliebigen Programmcode auszuf\u00fchren oder einen Denial of Service Zustand herbeizuf\u00fchren.", "title": "Angriff" }, { "category": "general", "text": "- Linux\n- UNIX\n- Windows", "title": "Betroffene Betriebssysteme" } ], "publisher": { "category": "other", "contact_details": "csaf-provider@cert-bund.de", "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik", "namespace": "https://www.bsi.bund.de" }, "references": [ { "category": "self", "summary": "WID-SEC-W-2023-1886 - CSAF Version", "url": "https://wid.cert-bund.de/.well-known/csaf/white/2023/wid-sec-w-2023-1886.json" }, { "category": "self", "summary": "WID-SEC-2023-1886 - Portal Version", "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2023-1886" }, { "category": "external", "summary": "Sophos Security Advisory vom 2023-07-25", "url": "https://community.sophos.com/utm-firewall/b/blog/posts/utm-up2date-9-716-released" }, { "category": "external", "summary": "Ubuntu Security Notice USN-6854-1 vom 2024-06-27", "url": "https://ubuntu.com/security/notices/USN-6854-1" } ], "source_lang": "en-US", "title": "Sophos Unified Threat Management (UTM) Software: Mehrere Schwachstellen", "tracking": { "current_release_date": "2024-06-26T22:00:00.000+00:00", "generator": { "date": "2024-08-15T17:56:13.608+00:00", "engine": { "name": "BSI-WID", "version": "1.3.5" } }, "id": "WID-SEC-W-2023-1886", "initial_release_date": "2023-07-25T22:00:00.000+00:00", "revision_history": [ { "date": "2023-07-25T22:00:00.000+00:00", "number": "1", "summary": "Initiale Fassung" }, { "date": "2024-06-26T22:00:00.000+00:00", "number": "2", "summary": "Neue Updates von Ubuntu aufgenommen" } ], "status": "final", "version": "2" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version_range", "name": "\u003c9.716", "product": { "name": "Sophos Unified Threat Management (UTM) Software \u003c9.716", "product_id": "T028896" } } ], "category": "product_name", "name": "Unified Threat Management (UTM) Software" } ], "category": "vendor", "name": "Sophos" }, { "branches": [ { "category": "product_name", "name": "Ubuntu Linux", "product": { "name": "Ubuntu Linux", "product_id": "T000126", "product_identification_helper": { "cpe": "cpe:/o:canonical:ubuntu_linux:-" } } } ], "category": "vendor", "name": "Ubuntu" } ] }, "vulnerabilities": [ { "cve": "CVE-2002-20001", "notes": [ { "category": "description", "text": "In Sophos Unified Threat Management (UTM) Software existieren mehrere Schwachstellen. Diese sind auf Fehler in der Komponenten \"OpenSSL\", \"WebAdmin\" sowie Fehler in der Webapplication-Firewall (WAF) zur\u00fcckzuf\u00fchren. Ein entfernter, authentisierter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T000126" ] }, "release_date": "2023-07-25T22:00:00.000+00:00", "title": "CVE-2002-20001" }, { "cve": "CVE-2022-40735", "notes": [ { "category": "description", "text": "In Sophos Unified Threat Management (UTM) Software existieren mehrere Schwachstellen. Diese sind auf Fehler in der Komponenten \"OpenSSL\", \"WebAdmin\" sowie Fehler in der Webapplication-Firewall (WAF) zur\u00fcckzuf\u00fchren. Ein entfernter, authentisierter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T000126" ] }, "release_date": "2023-07-25T22:00:00.000+00:00", "title": "CVE-2022-40735" }, { "cve": "CVE-2023-0215", "notes": [ { "category": "description", "text": "In Sophos Unified Threat Management (UTM) Software existieren mehrere Schwachstellen. Diese sind auf Fehler in der Komponenten \"OpenSSL\", \"WebAdmin\" sowie Fehler in der Webapplication-Firewall (WAF) zur\u00fcckzuf\u00fchren. Ein entfernter, authentisierter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T000126" ] }, "release_date": "2023-07-25T22:00:00.000+00:00", "title": "CVE-2023-0215" }, { "cve": "CVE-2023-0286", "notes": [ { "category": "description", "text": "In Sophos Unified Threat Management (UTM) Software existieren mehrere Schwachstellen. Diese sind auf Fehler in der Komponenten \"OpenSSL\", \"WebAdmin\" sowie Fehler in der Webapplication-Firewall (WAF) zur\u00fcckzuf\u00fchren. Ein entfernter, authentisierter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T000126" ] }, "release_date": "2023-07-25T22:00:00.000+00:00", "title": "CVE-2023-0286" }, { "cve": "CVE-2023-3367", "notes": [ { "category": "description", "text": "In Sophos Unified Threat Management (UTM) Software existieren mehrere Schwachstellen. Diese sind auf Fehler in der Komponenten \"OpenSSL\", \"WebAdmin\" sowie Fehler in der Webapplication-Firewall (WAF) zur\u00fcckzuf\u00fchren. Ein entfernter, authentisierter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T000126" ] }, "release_date": "2023-07-25T22:00:00.000+00:00", "title": "CVE-2023-3367" } ] }
wid-sec-w-2024-3056
Vulnerability from csaf_certbund
Notes
{ "document": { "aggregate_severity": { "text": "mittel" }, "category": "csaf_base", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "de-DE", "notes": [ { "category": "legal_disclaimer", "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen." }, { "category": "description", "text": "Transport Layer Security (TLS) ist ein hybrides Verschl\u00fcsselungsprotokoll zur Daten\u00fcbertragung im Internet.\r\nOpenSSL ist eine im Quelltext frei verf\u00fcgbare Bibliothek, die Secure Sockets Layer (SSL) und Transport Layer Security (TLS) implementiert.\r\nGnuTLS (GNU Transport Layer Security Library) ist eine im Quelltext frei verf\u00fcgbare Bibliothek, die Secure Sockets Layer (SSL) und Transport Layer Security (TLS) implementiert.\r\nOpenVPN ist eine Open Source Software zum Aufbau eines Virtuellen Privaten Netzwerkes (VPN) \u00fcber eine verschl\u00fcsselte TLS-Verbindung. Zur Verschl\u00fcsselung werden die Bibliotheken des Programmes OpenSSL benutzt.\r\nOpenJDK ist eine Java Umgebung, die unter der GPLv2 ver\u00f6ffentlicht wird.", "title": "Produktbeschreibung" }, { "category": "summary", "text": "Ein entfernter anonymer Angreifer kann mehrere Schwachstellen in verschiedenen Diffie-Hellman Implementierungen ausnutzen, um einen Denial-of-Service-Zustand zu erzeugen.", "title": "Angriff" }, { "category": "general", "text": "- Sonstiges\n- UNIX\n- Windows", "title": "Betroffene Betriebssysteme" } ], "publisher": { "category": "other", "contact_details": "csaf-provider@cert-bund.de", "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik", "namespace": "https://www.bsi.bund.de" }, "references": [ { "category": "self", "summary": "WID-SEC-W-2024-3056 - CSAF Version", "url": "https://wid.cert-bund.de/.well-known/csaf/white/2024/wid-sec-w-2024-3056.json" }, { "category": "self", "summary": "WID-SEC-2024-3056 - Portal Version", "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2024-3056" }, { "category": "external", "summary": "NIST Vulnerability Database vom 2024-09-30", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-41996" }, { "category": "external", "summary": "NIST Vulnerability Database vom 2024-09-30", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-40735" }, { "category": "external", "summary": "NIST Vulnerability Database vom 2024-09-30", "url": "https://nvd.nist.gov/vuln/detail/CVE-2002-20001" }, { "category": "external", "summary": "D(HE)at Attack Website vom 2024-09-30", "url": "https://dheatattack.gitlab.io/details/" }, { "category": "external", "summary": "D(HE)at Attack Website vom 2024-09-30", "url": "https://dheatattack.gitlab.io/faq/" }, { "category": "external", "summary": "D(HE)at Attack Website vom 2024-09-30", "url": "https://dheatattack.gitlab.io/mitigations/" }, { "category": "external", "summary": "Cybersecurity News vom 2024-09-30", "url": "https://cybersecuritynews.com/dheat-attack/" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:3501-1 vom 2024-10-01", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-October/019541.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:3501-1 vom 2024-10-01", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/WX2JI3MUD4LZ3SGGRVYKP45PM2L4E7A2/" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:3501-1 vom 2024-10-01", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/WX2JI3MUD4LZ3SGGRVYKP45PM2L4E7A2/" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:3525-1 vom 2024-10-04", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/WH2LICAK2VLI5365FJFTS2QU4XOMKFF5/" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:3525-1 vom 2024-10-04", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/WH2LICAK2VLI5365FJFTS2QU4XOMKFF5/" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:3766-1 vom 2024-10-29", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/2YIIP7KVUHLQSOVN6ND3S7Y63XWGGD3T/" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:3766-1 vom 2024-10-29", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2YIIP7KVUHLQSOVN6ND3S7Y63XWGGD3T/" }, { "category": "external", "summary": "F5 Security Advisory K000148343 vom 2024-10-31", "url": "https://my.f5.com/manage/s/article/K000148343" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:3871-1 vom 2024-11-01", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-November/019759.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:20081-1 vom 2025-06-04", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021234.html" }, { "category": "external", "summary": "ExtremeNetworks Vulnerability Notice SA-2025-065 vom 2025-07-29", "url": "https://extreme-networks.my.site.com/ExtrArticleDetail?an=000128178" } ], "source_lang": "en-US", "title": "Diffie-Hellman Implementierungen: Mehrere Schwachstellen erm\u00f6glichen Denial of Service", "tracking": { "current_release_date": "2025-07-29T22:00:00.000+00:00", "generator": { "date": "2025-07-30T09:10:42.963+00:00", "engine": { "name": "BSI-WID", "version": "1.4.0" } }, "id": "WID-SEC-W-2024-3056", "initial_release_date": "2024-09-30T22:00:00.000+00:00", "revision_history": [ { "date": "2024-09-30T22:00:00.000+00:00", "number": "1", "summary": "Initiale Fassung" }, { "date": "2024-10-01T22:00:00.000+00:00", "number": "2", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2024-10-06T22:00:00.000+00:00", "number": "3", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2024-10-28T23:00:00.000+00:00", "number": "4", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2024-10-30T23:00:00.000+00:00", "number": "5", "summary": "Neue Updates von F5 aufgenommen" }, { "date": "2024-11-03T23:00:00.000+00:00", "number": "6", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2025-06-04T22:00:00.000+00:00", "number": "7", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2025-07-29T22:00:00.000+00:00", "number": "8", "summary": "Neue Updates von ExtremeNetworks aufgenommen" } ], "status": "final", "version": "8" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version_range", "name": "\u003c10.8r3", "product": { "name": "Extreme Networks HiveOS \u003c10.8r3", "product_id": "T045721" } }, { "category": "product_version", "name": "10.8r3", "product": { "name": "Extreme Networks HiveOS 10.8r3", "product_id": "T045721-fixed", "product_identification_helper": { "cpe": "cpe:/o:extremenetworks:hiveos:10.8r3" } } } ], "category": "product_name", "name": "HiveOS" } ], "category": "vendor", "name": "Extreme Networks" }, { "branches": [ { "category": "product_name", "name": "F5 BIG-IP", "product": { "name": "F5 BIG-IP", "product_id": "T001663", "product_identification_helper": { "cpe": "cpe:/a:f5:big-ip:-" } } } ], "category": "vendor", "name": "F5" }, { "branches": [ { "branches": [ { "category": "product_version_range", "name": "\u003e=3.5.6", "product": { "name": "Open Source GnuTLS \u003e=3.5.6", "product_id": "T037921" } }, { "category": "product_version_range", "name": "\u003e=3.5.6", "product": { "name": "Open Source GnuTLS \u003e=3.5.6", "product_id": "T037921-fixed" } }, { "category": "product_version_range", "name": "\u003e=3.6.3", "product": { "name": "Open Source GnuTLS \u003e=3.6.3", "product_id": "T037922" } }, { "category": "product_version_range", "name": "\u003e=3.6.3", "product": { "name": "Open Source GnuTLS \u003e=3.6.3", "product_id": "T037922-fixed" } } ], "category": "product_name", "name": "GnuTLS" }, { "branches": [ { "category": "product_version_range", "name": "\u003c=17.0.5", "product": { "name": "Open Source OpenJDK \u003c=17.0.5", "product_id": "T037924" } }, { "category": "product_version_range", "name": "\u003c=17.0.5", "product": { "name": "Open Source OpenJDK \u003c=17.0.5", "product_id": "T037924-fixed" } } ], "category": "product_name", "name": "OpenJDK" }, { "branches": [ { "category": "product_version_range", "name": "\u003e=3.0", "product": { "name": "Open Source OpenSSL \u003e=3.0", "product_id": "T037920" } }, { "category": "product_version_range", "name": "\u003e=3.0", "product": { "name": "Open Source OpenSSL \u003e=3.0", "product_id": "T037920-fixed" } } ], "category": "product_name", "name": "OpenSSL" }, { "category": "product_name", "name": "Open Source OpenVPN", "product": { "name": "Open Source OpenVPN", "product_id": "T037926", "product_identification_helper": { "cpe": "cpe:/a:openvpn:openvpn:-" } } } ], "category": "vendor", "name": "Open Source" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux", "product": { "name": "SUSE Linux", "product_id": "T002207", "product_identification_helper": { "cpe": "cpe:/o:suse:suse_linux:-" } } } ], "category": "vendor", "name": "SUSE" }, { "branches": [ { "category": "product_name", "name": "Specification TLS", "product": { "name": "Specification TLS", "product_id": "T037919", "product_identification_helper": { "cpe": "cpe:/a:open_source:tls1:-" } } } ], "category": "vendor", "name": "Specification" } ] }, "vulnerabilities": [ { "cve": "CVE-2002-20001", "product_status": { "known_affected": [ "T045721", "T037926", "T002207", "T001663", "T037919" ], "last_affected": [ "T037924" ] }, "release_date": "2024-09-30T22:00:00.000+00:00", "title": "CVE-2002-20001" }, { "cve": "CVE-2022-40735", "product_status": { "known_affected": [ "T045721", "T037926", "T002207", "T001663", "T037919" ], "last_affected": [ "T037924" ] }, "release_date": "2024-09-30T22:00:00.000+00:00", "title": "CVE-2022-40735" }, { "cve": "CVE-2024-41996", "product_status": { "known_affected": [ "T045721", "T037926", "T002207", "T001663", "T037919" ], "last_affected": [ "T037924" ] }, "release_date": "2024-09-30T22:00:00.000+00:00", "title": "CVE-2024-41996" } ] }
wid-sec-w-2023-1886
Vulnerability from csaf_certbund
Notes
{ "document": { "aggregate_severity": { "text": "hoch" }, "category": "csaf_base", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "de-DE", "notes": [ { "category": "legal_disclaimer", "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen." }, { "category": "description", "text": "Sophos UTM ist eine Netzwerk-Appliance mit diversen Sicherheitsfunktionen (z.B. Firewall, Antivirus, Contentfilter).", "title": "Produktbeschreibung" }, { "category": "summary", "text": "Ein entfernter, authentisierter Angreifer kann mehrere Schwachstellen in Sophos Unified Threat Management (UTM) Software ausnutzen, um beliebigen Programmcode auszuf\u00fchren oder einen Denial of Service Zustand herbeizuf\u00fchren.", "title": "Angriff" }, { "category": "general", "text": "- Linux\n- UNIX\n- Windows", "title": "Betroffene Betriebssysteme" } ], "publisher": { "category": "other", "contact_details": "csaf-provider@cert-bund.de", "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik", "namespace": "https://www.bsi.bund.de" }, "references": [ { "category": "self", "summary": "WID-SEC-W-2023-1886 - CSAF Version", "url": "https://wid.cert-bund.de/.well-known/csaf/white/2023/wid-sec-w-2023-1886.json" }, { "category": "self", "summary": "WID-SEC-2023-1886 - Portal Version", "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2023-1886" }, { "category": "external", "summary": "Sophos Security Advisory vom 2023-07-25", "url": "https://community.sophos.com/utm-firewall/b/blog/posts/utm-up2date-9-716-released" }, { "category": "external", "summary": "Ubuntu Security Notice USN-6854-1 vom 2024-06-27", "url": "https://ubuntu.com/security/notices/USN-6854-1" } ], "source_lang": "en-US", "title": "Sophos Unified Threat Management (UTM) Software: Mehrere Schwachstellen", "tracking": { "current_release_date": "2024-06-26T22:00:00.000+00:00", "generator": { "date": "2024-08-15T17:56:13.608+00:00", "engine": { "name": "BSI-WID", "version": "1.3.5" } }, "id": "WID-SEC-W-2023-1886", "initial_release_date": "2023-07-25T22:00:00.000+00:00", "revision_history": [ { "date": "2023-07-25T22:00:00.000+00:00", "number": "1", "summary": "Initiale Fassung" }, { "date": "2024-06-26T22:00:00.000+00:00", "number": "2", "summary": "Neue Updates von Ubuntu aufgenommen" } ], "status": "final", "version": "2" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version_range", "name": "\u003c9.716", "product": { "name": "Sophos Unified Threat Management (UTM) Software \u003c9.716", "product_id": "T028896" } } ], "category": "product_name", "name": "Unified Threat Management (UTM) Software" } ], "category": "vendor", "name": "Sophos" }, { "branches": [ { "category": "product_name", "name": "Ubuntu Linux", "product": { "name": "Ubuntu Linux", "product_id": "T000126", "product_identification_helper": { "cpe": "cpe:/o:canonical:ubuntu_linux:-" } } } ], "category": "vendor", "name": "Ubuntu" } ] }, "vulnerabilities": [ { "cve": "CVE-2002-20001", "notes": [ { "category": "description", "text": "In Sophos Unified Threat Management (UTM) Software existieren mehrere Schwachstellen. Diese sind auf Fehler in der Komponenten \"OpenSSL\", \"WebAdmin\" sowie Fehler in der Webapplication-Firewall (WAF) zur\u00fcckzuf\u00fchren. Ein entfernter, authentisierter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T000126" ] }, "release_date": "2023-07-25T22:00:00.000+00:00", "title": "CVE-2002-20001" }, { "cve": "CVE-2022-40735", "notes": [ { "category": "description", "text": "In Sophos Unified Threat Management (UTM) Software existieren mehrere Schwachstellen. Diese sind auf Fehler in der Komponenten \"OpenSSL\", \"WebAdmin\" sowie Fehler in der Webapplication-Firewall (WAF) zur\u00fcckzuf\u00fchren. Ein entfernter, authentisierter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T000126" ] }, "release_date": "2023-07-25T22:00:00.000+00:00", "title": "CVE-2022-40735" }, { "cve": "CVE-2023-0215", "notes": [ { "category": "description", "text": "In Sophos Unified Threat Management (UTM) Software existieren mehrere Schwachstellen. Diese sind auf Fehler in der Komponenten \"OpenSSL\", \"WebAdmin\" sowie Fehler in der Webapplication-Firewall (WAF) zur\u00fcckzuf\u00fchren. Ein entfernter, authentisierter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T000126" ] }, "release_date": "2023-07-25T22:00:00.000+00:00", "title": "CVE-2023-0215" }, { "cve": "CVE-2023-0286", "notes": [ { "category": "description", "text": "In Sophos Unified Threat Management (UTM) Software existieren mehrere Schwachstellen. Diese sind auf Fehler in der Komponenten \"OpenSSL\", \"WebAdmin\" sowie Fehler in der Webapplication-Firewall (WAF) zur\u00fcckzuf\u00fchren. Ein entfernter, authentisierter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T000126" ] }, "release_date": "2023-07-25T22:00:00.000+00:00", "title": "CVE-2023-0286" }, { "cve": "CVE-2023-3367", "notes": [ { "category": "description", "text": "In Sophos Unified Threat Management (UTM) Software existieren mehrere Schwachstellen. Diese sind auf Fehler in der Komponenten \"OpenSSL\", \"WebAdmin\" sowie Fehler in der Webapplication-Firewall (WAF) zur\u00fcckzuf\u00fchren. Ein entfernter, authentisierter Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T000126" ] }, "release_date": "2023-07-25T22:00:00.000+00:00", "title": "CVE-2023-3367" } ] }
gsd-2022-40735
Vulnerability from gsd
{ "GSD": { "alias": "CVE-2022-40735", "id": "GSD-2022-40735", "references": [ "https://www.suse.com/security/cve/CVE-2022-40735.html" ] }, "gsd": { "metadata": { "exploitCode": "unknown", "remediation": "unknown", "reportConfidence": "confirmed", "type": "vulnerability" }, "osvSchema": { "aliases": [ "CVE-2022-40735" ], "details": "The Diffie-Hellman Key Agreement Protocol allows use of long exponents that arguably make certain calculations unnecessarily expensive, because the 1996 van Oorschot and Wiener paper found that \"(appropriately) short exponents\" can be used when there are adequate subgroup constraints, and these short exponents can lead to less expensive calculations than for long exponents. This issue is different from CVE-2002-20001 because it is based on an observation about exponent size, rather than an observation about numbers that are not public keys. The specific situations in which calculation expense would constitute a server-side vulnerability depend on the protocol (e.g., TLS, SSH, or IKE) and the DHE implementation details. In general, there might be an availability concern because of server-side resource consumption from DHE modular-exponentiation calculations. Finally, it is possible for an attacker to exploit this vulnerability and CVE-2002-20001 together.", "id": "GSD-2022-40735", "modified": "2023-12-13T01:19:30.760052Z", "schema_version": "1.4.0" } }, "namespaces": { "cve.org": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2022-40735", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The Diffie-Hellman Key Agreement Protocol allows use of long exponents that arguably make certain calculations unnecessarily expensive, because the 1996 van Oorschot and Wiener paper found that \"(appropriately) short exponents\" can be used when there are adequate subgroup constraints, and these short exponents can lead to less expensive calculations than for long exponents. This issue is different from CVE-2002-20001 because it is based on an observation about exponent size, rather than an observation about numbers that are not public keys. The specific situations in which calculation expense would constitute a server-side vulnerability depend on the protocol (e.g., TLS, SSH, or IKE) and the DHE implementation details. In general, there might be an availability concern because of server-side resource consumption from DHE modular-exponentiation calculations. Finally, it is possible for an attacker to exploit this vulnerability and CVE-2002-20001 together." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://github.com/mozilla/ssl-config-generator/issues/162", "refsource": "MISC", "url": "https://github.com/mozilla/ssl-config-generator/issues/162" }, { "name": "https://gist.github.com/c0r0n3r/9455ddcab985c50fd1912eabf26e058b", "refsource": "MISC", "url": "https://gist.github.com/c0r0n3r/9455ddcab985c50fd1912eabf26e058b" }, { "name": "https://link.springer.com/content/pdf/10.1007/3-540-68339-9_29.pdf", "refsource": "MISC", "url": "https://link.springer.com/content/pdf/10.1007/3-540-68339-9_29.pdf" }, { "name": "https://www.researchgate.net/profile/Anton-Stiglic-2/publication/2401745_Security_Issues_in_the_Diffie-Hellman_Key_Agreement_Protocol/links/546c144f0cf20dedafd53e7e/Security-Issues-in-the-Diffie-Hellman-Key-Agreement-Protocol.pdf", "refsource": "MISC", "url": "https://www.researchgate.net/profile/Anton-Stiglic-2/publication/2401745_Security_Issues_in_the_Diffie-Hellman_Key_Agreement_Protocol/links/546c144f0cf20dedafd53e7e/Security-Issues-in-the-Diffie-Hellman-Key-Agreement-Protocol.pdf" }, { "name": "https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-57pt1r5.pdf", "refsource": "MISC", "url": "https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-57pt1r5.pdf" }, { "name": "https://www.rfc-editor.org/rfc/rfc4419", "refsource": "MISC", "url": "https://www.rfc-editor.org/rfc/rfc4419" }, { "name": "https://www.rfc-editor.org/rfc/rfc5114#section-4", "refsource": "MISC", "url": "https://www.rfc-editor.org/rfc/rfc5114#section-4" }, { "name": "https://www.rfc-editor.org/rfc/rfc7919#section-5.2", "refsource": "MISC", "url": "https://www.rfc-editor.org/rfc/rfc7919#section-5.2" }, { "name": "https://raw.githubusercontent.com/CVEProject/cvelist/9d7fbbcabd3f44cfedc9e8807757d31ece85a2c6/2022/40xxx/CVE-2022-40735.json", "refsource": "MISC", "url": "https://raw.githubusercontent.com/CVEProject/cvelist/9d7fbbcabd3f44cfedc9e8807757d31ece85a2c6/2022/40xxx/CVE-2022-40735.json" }, { "name": "https://www.rfc-editor.org/rfc/rfc3526", "refsource": "MISC", "url": "https://www.rfc-editor.org/rfc/rfc3526" }, { "name": "https://dheatattack.gitlab.io/", "refsource": "MISC", "url": "https://dheatattack.gitlab.io/" }, { "name": "https://ieeexplore.ieee.org/document/10374117", "refsource": "MISC", "url": "https://ieeexplore.ieee.org/document/10374117" } ] } }, "nvd.nist.gov": { "cve": { "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:diffie-hellman_key_exchange_project:diffie-hellman_key_exchange:-:*:*:*:*:*:*:*", "matchCriteriaId": "43F56DA8-0635-41E8-B91C-485695B587AD", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "descriptions": [ { "lang": "en", "value": "The Diffie-Hellman Key Agreement Protocol allows use of long exponents that arguably make certain calculations unnecessarily expensive, because the 1996 van Oorschot and Wiener paper found that \"(appropriately) short exponents\" can be used when there are adequate subgroup constraints, and these short exponents can lead to less expensive calculations than for long exponents. This issue is different from CVE-2002-20001 because it is based on an observation about exponent size, rather than an observation about numbers that are not public keys. The specific situations in which calculation expense would constitute a server-side vulnerability depend on the protocol (e.g., TLS, SSH, or IKE) and the DHE implementation details. In general, there might be an availability concern because of server-side resource consumption from DHE modular-exponentiation calculations. Finally, it is possible for an attacker to exploit this vulnerability and CVE-2002-20001 together." }, { "lang": "es", "value": "Diffie-Hellman Key Agreement Protocol permite el uso de exponentes largos que posiblemente hacen que ciertos c\u00e1lculos sean innecesariamente costosos, porque el art\u00edculo de van Oorschot y Wiener de 1996 encontr\u00f3 que se pueden usar \"exponentes (apropiadamente) cortos\" cuando existen restricciones de subgrupo adecuadas, y estos exponentes cortos pueden conducir a c\u00e1lculos menos costosos que los de exponentes largos. Este problema es diferente de CVE-2002-20001, porque se basa en una observaci\u00f3n sobre el tama\u00f1o del exponente, en lugar de una observaci\u00f3n sobre n\u00fameros que no son claves p\u00fablicas. Las situaciones espec\u00edficas en las que el gasto de c\u00e1lculo constituir\u00eda una vulnerabilidad del lado del servidor dependen del protocolo (por ejemplo, TLS, SSH o IKE) y los detalles de implementaci\u00f3n de DHE. En general, puede haber un problema de disponibilidad debido al consumo de recursos del lado del servidor a partir de los c\u00e1lculos de exponenciaci\u00f3n modular de DHE. Finalmente, es posible que un atacante aproveche esta vulnerabilidad y CVE-2002-20001 juntos." } ], "id": "CVE-2022-40735", "lastModified": "2024-04-23T07:15:42.550", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2022-11-14T23:15:11.423", "references": [ { "source": "cve@mitre.org", "url": "https://dheatattack.gitlab.io/" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://gist.github.com/c0r0n3r/9455ddcab985c50fd1912eabf26e058b" }, { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/mozilla/ssl-config-generator/issues/162" }, { "source": "cve@mitre.org", "url": "https://ieeexplore.ieee.org/document/10374117" }, { "source": "cve@mitre.org", "tags": [ "Technical Description", "Third Party Advisory" ], "url": "https://link.springer.com/content/pdf/10.1007/3-540-68339-9_29.pdf" }, { "source": "cve@mitre.org", "tags": [ "Technical Description", "Third Party Advisory", "US Government Resource" ], "url": "https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-57pt1r5.pdf" }, { "source": "cve@mitre.org", "url": "https://raw.githubusercontent.com/CVEProject/cvelist/9d7fbbcabd3f44cfedc9e8807757d31ece85a2c6/2022/40xxx/CVE-2022-40735.json" }, { "source": "cve@mitre.org", "tags": [ "Technical Description", "Third Party Advisory" ], "url": "https://www.researchgate.net/profile/Anton-Stiglic-2/publication/2401745_Security_Issues_in_the_Diffie-Hellman_Key_Agreement_Protocol/links/546c144f0cf20dedafd53e7e/Security-Issues-in-the-Diffie-Hellman-Key-Agreement-Protocol.pdf" }, { "source": "cve@mitre.org", "url": "https://www.rfc-editor.org/rfc/rfc3526" }, { "source": "cve@mitre.org", "url": "https://www.rfc-editor.org/rfc/rfc4419" }, { "source": "cve@mitre.org", "url": "https://www.rfc-editor.org/rfc/rfc5114#section-4" }, { "source": "cve@mitre.org", "url": "https://www.rfc-editor.org/rfc/rfc7919#section-5.2" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-400" } ], "source": "nvd@nist.gov", "type": "Primary" } ] } } } }
ghsa-8vmc-7qrc-q5mx
Vulnerability from github
Using long exponents in the Diffie-Hellman Key Agreement Protocol allows remote attackers (from the client side) to trigger unnecessarily expensive server-side DHE modular-exponentiation calculations. An attacker may cause asymmetric resource consumption with any common client application which uses a DHE implementation that applies short exponents. The attack may be more disruptive in cases where a client sends arbitrary numbers that are actually not DH public keys (aka the D(HE)ater attack) or can require a server to select its largest supported key size. The basic attack scenario is that the client must claim that it can only communicate with DHE, and the server must be configured to allow DHE. This can affect TLS, SSH, and IKE.
{ "affected": [], "aliases": [ "CVE-2022-40735" ], "database_specific": { "cwe_ids": [ "CWE-400" ], "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2022-11-14T23:15:00Z", "severity": "HIGH" }, "details": "Using long exponents in the Diffie-Hellman Key Agreement Protocol allows remote attackers (from the client side) to trigger unnecessarily expensive server-side DHE modular-exponentiation calculations. An attacker may cause asymmetric resource consumption with any common client application which uses a DHE implementation that applies short exponents. The attack may be more disruptive in cases where a client sends arbitrary numbers that are actually not DH public keys (aka the D(HE)ater attack) or can require a server to select its largest supported key size. The basic attack scenario is that the client must claim that it can only communicate with DHE, and the server must be configured to allow DHE. This can affect TLS, SSH, and IKE.", "id": "GHSA-8vmc-7qrc-q5mx", "modified": "2024-04-23T09:30:46Z", "published": "2022-11-15T12:00:17Z", "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-40735" }, { "type": "WEB", "url": "https://github.com/mozilla/ssl-config-generator/issues/162" }, { "type": "WEB", "url": "https://dheatattack.gitlab.io" }, { "type": "WEB", "url": "https://gist.github.com/c0r0n3r/9455ddcab985c50fd1912eabf26e058b" }, { "type": "WEB", "url": "https://ieeexplore.ieee.org/document/10374117" }, { "type": "WEB", "url": "https://link.springer.com/content/pdf/10.1007/3-540-68339-9_29.pdf" }, { "type": "WEB", "url": "https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-57pt1r5.pdf" }, { "type": "WEB", "url": "https://raw.githubusercontent.com/CVEProject/cvelist/9d7fbbcabd3f44cfedc9e8807757d31ece85a2c6/2022/40xxx/CVE-2022-40735.json" }, { "type": "WEB", "url": "https://www.researchgate.net/profile/Anton-Stiglic-2/publication/2401745_Security_Issues_in_the_Diffie-Hellman_Key_Agreement_Protocol/links/546c144f0cf20dedafd53e7e/Security-Issues-in-the-Diffie-Hellman-Key-Agreement-Protocol.pdf" }, { "type": "WEB", "url": "https://www.rfc-editor.org/rfc/rfc3526" }, { "type": "WEB", "url": "https://www.rfc-editor.org/rfc/rfc4419" }, { "type": "WEB", "url": "https://www.rfc-editor.org/rfc/rfc5114#section-4" }, { "type": "WEB", "url": "https://www.rfc-editor.org/rfc/rfc7919#section-5.2" } ], "schema_version": "1.4.0", "severity": [ { "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "type": "CVSS_V3" } ] }
fkie_cve-2022-40735
Vulnerability from fkie_nvd
Vendor | Product | Version | |
---|---|---|---|
diffie-hellman_key_exchange_project | diffie-hellman_key_exchange | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:diffie-hellman_key_exchange_project:diffie-hellman_key_exchange:-:*:*:*:*:*:*:*", "matchCriteriaId": "43F56DA8-0635-41E8-B91C-485695B587AD", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Diffie-Hellman Key Agreement Protocol allows use of long exponents that arguably make certain calculations unnecessarily expensive, because the 1996 van Oorschot and Wiener paper found that \"(appropriately) short exponents\" can be used when there are adequate subgroup constraints, and these short exponents can lead to less expensive calculations than for long exponents. This issue is different from CVE-2002-20001 because it is based on an observation about exponent size, rather than an observation about numbers that are not public keys. The specific situations in which calculation expense would constitute a server-side vulnerability depend on the protocol (e.g., TLS, SSH, or IKE) and the DHE implementation details. In general, there might be an availability concern because of server-side resource consumption from DHE modular-exponentiation calculations. Finally, it is possible for an attacker to exploit this vulnerability and CVE-2002-20001 together." }, { "lang": "es", "value": "Diffie-Hellman Key Agreement Protocol permite el uso de exponentes largos que posiblemente hacen que ciertos c\u00e1lculos sean innecesariamente costosos, porque el art\u00edculo de van Oorschot y Wiener de 1996 encontr\u00f3 que se pueden usar \"exponentes (apropiadamente) cortos\" cuando existen restricciones de subgrupo adecuadas, y estos exponentes cortos pueden conducir a c\u00e1lculos menos costosos que los de exponentes largos. Este problema es diferente de CVE-2002-20001, porque se basa en una observaci\u00f3n sobre el tama\u00f1o del exponente, en lugar de una observaci\u00f3n sobre n\u00fameros que no son claves p\u00fablicas. Las situaciones espec\u00edficas en las que el gasto de c\u00e1lculo constituir\u00eda una vulnerabilidad del lado del servidor dependen del protocolo (por ejemplo, TLS, SSH o IKE) y los detalles de implementaci\u00f3n de DHE. En general, puede haber un problema de disponibilidad debido al consumo de recursos del lado del servidor a partir de los c\u00e1lculos de exponenciaci\u00f3n modular de DHE. Finalmente, es posible que un atacante aproveche esta vulnerabilidad y CVE-2002-20001 juntos." } ], "id": "CVE-2022-40735", "lastModified": "2024-11-21T07:21:56.900", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2022-11-14T23:15:11.423", "references": [ { "source": "cve@mitre.org", "url": "https://dheatattack.gitlab.io/" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://gist.github.com/c0r0n3r/9455ddcab985c50fd1912eabf26e058b" }, { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/mozilla/ssl-config-generator/issues/162" }, { "source": "cve@mitre.org", "url": "https://ieeexplore.ieee.org/document/10374117" }, { "source": "cve@mitre.org", "tags": [ "Technical Description", "Third Party Advisory" ], "url": "https://link.springer.com/content/pdf/10.1007/3-540-68339-9_29.pdf" }, { "source": "cve@mitre.org", "tags": [ "Technical Description", "Third Party Advisory", "US Government Resource" ], "url": "https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-57pt1r5.pdf" }, { "source": "cve@mitre.org", "url": "https://raw.githubusercontent.com/CVEProject/cvelist/9d7fbbcabd3f44cfedc9e8807757d31ece85a2c6/2022/40xxx/CVE-2022-40735.json" }, { "source": "cve@mitre.org", "tags": [ "Technical Description", "Third Party Advisory" ], "url": "https://www.researchgate.net/profile/Anton-Stiglic-2/publication/2401745_Security_Issues_in_the_Diffie-Hellman_Key_Agreement_Protocol/links/546c144f0cf20dedafd53e7e/Security-Issues-in-the-Diffie-Hellman-Key-Agreement-Protocol.pdf" }, { "source": "cve@mitre.org", "url": "https://www.rfc-editor.org/rfc/rfc3526" }, { "source": "cve@mitre.org", "url": "https://www.rfc-editor.org/rfc/rfc4419" }, { "source": "cve@mitre.org", "url": "https://www.rfc-editor.org/rfc/rfc5114#section-4" }, { "source": "cve@mitre.org", "url": "https://www.rfc-editor.org/rfc/rfc7919#section-5.2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://dheatattack.gitlab.io/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://gist.github.com/c0r0n3r/9455ddcab985c50fd1912eabf26e058b" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/mozilla/ssl-config-generator/issues/162" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://ieeexplore.ieee.org/document/10374117" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Technical Description", "Third Party Advisory" ], "url": "https://link.springer.com/content/pdf/10.1007/3-540-68339-9_29.pdf" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Technical Description", "Third Party Advisory", "US Government Resource" ], "url": "https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-57pt1r5.pdf" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://raw.githubusercontent.com/CVEProject/cvelist/9d7fbbcabd3f44cfedc9e8807757d31ece85a2c6/2022/40xxx/CVE-2022-40735.json" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Technical Description", "Third Party Advisory" ], "url": "https://www.researchgate.net/profile/Anton-Stiglic-2/publication/2401745_Security_Issues_in_the_Diffie-Hellman_Key_Agreement_Protocol/links/546c144f0cf20dedafd53e7e/Security-Issues-in-the-Diffie-Hellman-Key-Agreement-Protocol.pdf" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://www.rfc-editor.org/rfc/rfc3526" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://www.rfc-editor.org/rfc/rfc4419" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://www.rfc-editor.org/rfc/rfc5114#section-4" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://www.rfc-editor.org/rfc/rfc7919#section-5.2" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-400" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
suse-su-2023:2470-1
Vulnerability from csaf_suse
Notes
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for openssl-3", "title": "Title of the patch" }, { "category": "description", "text": "This update for openssl-3 fixes the following issues:\n\n- Update to version 3.0.8 (bsc#1207541).\n\n- CVE-2022-40735: Fixed remote trigger of expensive server-side DHE modular-exponentiation with long exponents in Diffie-Hellman Key Agreement Protocol (bsc#1205476).\n- CVE-2023-1255: Fixed input buffer over-read in AES-XTS implementation on 64 bit ARM (bsc#1210714).\n- CVE-2023-2650: Fixed possible DoS translating ASN.1 object identifiers (bsc#1211430).\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-2023-2470,SUSE-SLE-Module-Basesystem-15-SP4-2023-2470,openSUSE-SLE-15.4-2023-2470", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2023_2470-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2023:2470-1", "url": "https://www.suse.com/support/update/announcement/2023/suse-su-20232470-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2023:2470-1", "url": "https://lists.suse.com/pipermail/sle-updates/2023-June/029771.html" }, { "category": "self", "summary": "SUSE Bug 1205476", "url": "https://bugzilla.suse.com/1205476" }, { "category": "self", "summary": "SUSE Bug 1210714", "url": "https://bugzilla.suse.com/1210714" }, { "category": "self", "summary": "SUSE Bug 1211430", "url": "https://bugzilla.suse.com/1211430" }, { "category": "self", "summary": "SUSE CVE CVE-2022-40735 page", "url": "https://www.suse.com/security/cve/CVE-2022-40735/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-1255 page", "url": "https://www.suse.com/security/cve/CVE-2023-1255/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-2650 page", "url": "https://www.suse.com/security/cve/CVE-2023-2650/" } ], "title": "Security update for openssl-3", "tracking": { "current_release_date": "2023-06-08T07:47:42Z", "generator": { "date": "2023-06-08T07:47:42Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2023:2470-1", "initial_release_date": "2023-06-08T07:47:42Z", "revision_history": [ { "date": "2023-06-08T07:47:42Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "libopenssl-3-devel-3.0.8-150400.4.26.1.aarch64", "product": { "name": "libopenssl-3-devel-3.0.8-150400.4.26.1.aarch64", "product_id": "libopenssl-3-devel-3.0.8-150400.4.26.1.aarch64" } }, { "category": "product_version", "name": "libopenssl3-3.0.8-150400.4.26.1.aarch64", "product": { "name": "libopenssl3-3.0.8-150400.4.26.1.aarch64", "product_id": "libopenssl3-3.0.8-150400.4.26.1.aarch64" } }, { "category": "product_version", "name": "openssl-3-3.0.8-150400.4.26.1.aarch64", "product": { "name": "openssl-3-3.0.8-150400.4.26.1.aarch64", "product_id": "openssl-3-3.0.8-150400.4.26.1.aarch64" } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "libopenssl-3-devel-64bit-3.0.8-150400.4.26.1.aarch64_ilp32", "product": { "name": "libopenssl-3-devel-64bit-3.0.8-150400.4.26.1.aarch64_ilp32", "product_id": "libopenssl-3-devel-64bit-3.0.8-150400.4.26.1.aarch64_ilp32" } }, { "category": "product_version", "name": "libopenssl3-64bit-3.0.8-150400.4.26.1.aarch64_ilp32", "product": { "name": "libopenssl3-64bit-3.0.8-150400.4.26.1.aarch64_ilp32", "product_id": "libopenssl3-64bit-3.0.8-150400.4.26.1.aarch64_ilp32" } } ], "category": "architecture", "name": "aarch64_ilp32" }, { "branches": [ { "category": "product_version", "name": "libopenssl-3-devel-3.0.8-150400.4.26.1.i586", "product": { "name": "libopenssl-3-devel-3.0.8-150400.4.26.1.i586", "product_id": "libopenssl-3-devel-3.0.8-150400.4.26.1.i586" } }, { "category": "product_version", "name": "libopenssl3-3.0.8-150400.4.26.1.i586", "product": { "name": "libopenssl3-3.0.8-150400.4.26.1.i586", "product_id": "libopenssl3-3.0.8-150400.4.26.1.i586" } }, { "category": "product_version", "name": "openssl-3-3.0.8-150400.4.26.1.i586", "product": { "name": "openssl-3-3.0.8-150400.4.26.1.i586", "product_id": "openssl-3-3.0.8-150400.4.26.1.i586" } } ], "category": "architecture", "name": "i586" }, { "branches": [ { "category": "product_version", "name": "openssl-3-doc-3.0.8-150400.4.26.1.noarch", "product": { "name": "openssl-3-doc-3.0.8-150400.4.26.1.noarch", "product_id": "openssl-3-doc-3.0.8-150400.4.26.1.noarch" } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "libopenssl-3-devel-3.0.8-150400.4.26.1.ppc64le", "product": { "name": "libopenssl-3-devel-3.0.8-150400.4.26.1.ppc64le", "product_id": "libopenssl-3-devel-3.0.8-150400.4.26.1.ppc64le" } }, { "category": "product_version", "name": "libopenssl3-3.0.8-150400.4.26.1.ppc64le", "product": { "name": "libopenssl3-3.0.8-150400.4.26.1.ppc64le", "product_id": "libopenssl3-3.0.8-150400.4.26.1.ppc64le" } }, { "category": "product_version", "name": "openssl-3-3.0.8-150400.4.26.1.ppc64le", "product": { "name": "openssl-3-3.0.8-150400.4.26.1.ppc64le", "product_id": "openssl-3-3.0.8-150400.4.26.1.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "libopenssl-3-devel-3.0.8-150400.4.26.1.s390x", "product": { "name": "libopenssl-3-devel-3.0.8-150400.4.26.1.s390x", "product_id": "libopenssl-3-devel-3.0.8-150400.4.26.1.s390x" } }, { "category": "product_version", "name": "libopenssl3-3.0.8-150400.4.26.1.s390x", "product": { "name": "libopenssl3-3.0.8-150400.4.26.1.s390x", "product_id": "libopenssl3-3.0.8-150400.4.26.1.s390x" } }, { "category": "product_version", "name": "openssl-3-3.0.8-150400.4.26.1.s390x", "product": { "name": "openssl-3-3.0.8-150400.4.26.1.s390x", "product_id": "openssl-3-3.0.8-150400.4.26.1.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "libopenssl-3-devel-3.0.8-150400.4.26.1.x86_64", "product": { "name": "libopenssl-3-devel-3.0.8-150400.4.26.1.x86_64", "product_id": "libopenssl-3-devel-3.0.8-150400.4.26.1.x86_64" } }, { "category": "product_version", "name": "libopenssl-3-devel-32bit-3.0.8-150400.4.26.1.x86_64", "product": { "name": "libopenssl-3-devel-32bit-3.0.8-150400.4.26.1.x86_64", "product_id": "libopenssl-3-devel-32bit-3.0.8-150400.4.26.1.x86_64" } }, { "category": "product_version", "name": "libopenssl3-3.0.8-150400.4.26.1.x86_64", "product": { "name": "libopenssl3-3.0.8-150400.4.26.1.x86_64", "product_id": "libopenssl3-3.0.8-150400.4.26.1.x86_64" } }, { "category": "product_version", "name": "libopenssl3-32bit-3.0.8-150400.4.26.1.x86_64", "product": { "name": "libopenssl3-32bit-3.0.8-150400.4.26.1.x86_64", "product_id": "libopenssl3-32bit-3.0.8-150400.4.26.1.x86_64" } }, { "category": "product_version", "name": "openssl-3-3.0.8-150400.4.26.1.x86_64", "product": { "name": "openssl-3-3.0.8-150400.4.26.1.x86_64", "product_id": "openssl-3-3.0.8-150400.4.26.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Module for Basesystem 15 SP4", "product": { "name": "SUSE Linux Enterprise Module for Basesystem 15 SP4", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP4", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-module-basesystem:15:sp4" } } }, { "category": "product_name", "name": "openSUSE Leap 15.4", "product": { "name": "openSUSE Leap 15.4", "product_id": "openSUSE Leap 15.4", "product_identification_helper": { "cpe": "cpe:/o:opensuse:leap:15.4" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "libopenssl-3-devel-3.0.8-150400.4.26.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP4", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP4:libopenssl-3-devel-3.0.8-150400.4.26.1.aarch64" }, "product_reference": "libopenssl-3-devel-3.0.8-150400.4.26.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "libopenssl-3-devel-3.0.8-150400.4.26.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP4", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP4:libopenssl-3-devel-3.0.8-150400.4.26.1.ppc64le" }, "product_reference": "libopenssl-3-devel-3.0.8-150400.4.26.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "libopenssl-3-devel-3.0.8-150400.4.26.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP4", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP4:libopenssl-3-devel-3.0.8-150400.4.26.1.s390x" }, "product_reference": "libopenssl-3-devel-3.0.8-150400.4.26.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "libopenssl-3-devel-3.0.8-150400.4.26.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP4", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP4:libopenssl-3-devel-3.0.8-150400.4.26.1.x86_64" }, "product_reference": "libopenssl-3-devel-3.0.8-150400.4.26.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "libopenssl3-3.0.8-150400.4.26.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP4", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP4:libopenssl3-3.0.8-150400.4.26.1.aarch64" }, "product_reference": "libopenssl3-3.0.8-150400.4.26.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "libopenssl3-3.0.8-150400.4.26.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP4", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP4:libopenssl3-3.0.8-150400.4.26.1.ppc64le" }, "product_reference": "libopenssl3-3.0.8-150400.4.26.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "libopenssl3-3.0.8-150400.4.26.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP4", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP4:libopenssl3-3.0.8-150400.4.26.1.s390x" }, "product_reference": "libopenssl3-3.0.8-150400.4.26.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "libopenssl3-3.0.8-150400.4.26.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP4", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP4:libopenssl3-3.0.8-150400.4.26.1.x86_64" }, "product_reference": "libopenssl3-3.0.8-150400.4.26.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-3-3.0.8-150400.4.26.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP4", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP4:openssl-3-3.0.8-150400.4.26.1.aarch64" }, "product_reference": "openssl-3-3.0.8-150400.4.26.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-3-3.0.8-150400.4.26.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP4", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP4:openssl-3-3.0.8-150400.4.26.1.ppc64le" }, "product_reference": "openssl-3-3.0.8-150400.4.26.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-3-3.0.8-150400.4.26.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP4", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP4:openssl-3-3.0.8-150400.4.26.1.s390x" }, "product_reference": "openssl-3-3.0.8-150400.4.26.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-3-3.0.8-150400.4.26.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP4", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP4:openssl-3-3.0.8-150400.4.26.1.x86_64" }, "product_reference": "openssl-3-3.0.8-150400.4.26.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "libopenssl-3-devel-3.0.8-150400.4.26.1.aarch64 as component of openSUSE Leap 15.4", "product_id": "openSUSE Leap 15.4:libopenssl-3-devel-3.0.8-150400.4.26.1.aarch64" }, "product_reference": "libopenssl-3-devel-3.0.8-150400.4.26.1.aarch64", "relates_to_product_reference": "openSUSE Leap 15.4" }, { "category": "default_component_of", "full_product_name": { "name": "libopenssl-3-devel-3.0.8-150400.4.26.1.ppc64le as component of openSUSE Leap 15.4", "product_id": "openSUSE Leap 15.4:libopenssl-3-devel-3.0.8-150400.4.26.1.ppc64le" }, "product_reference": "libopenssl-3-devel-3.0.8-150400.4.26.1.ppc64le", "relates_to_product_reference": "openSUSE Leap 15.4" }, { "category": "default_component_of", "full_product_name": { "name": "libopenssl-3-devel-3.0.8-150400.4.26.1.s390x as component of openSUSE Leap 15.4", "product_id": "openSUSE Leap 15.4:libopenssl-3-devel-3.0.8-150400.4.26.1.s390x" }, "product_reference": "libopenssl-3-devel-3.0.8-150400.4.26.1.s390x", "relates_to_product_reference": "openSUSE Leap 15.4" }, { "category": "default_component_of", "full_product_name": { "name": "libopenssl-3-devel-3.0.8-150400.4.26.1.x86_64 as component of openSUSE Leap 15.4", "product_id": "openSUSE Leap 15.4:libopenssl-3-devel-3.0.8-150400.4.26.1.x86_64" }, "product_reference": "libopenssl-3-devel-3.0.8-150400.4.26.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.4" }, { "category": "default_component_of", "full_product_name": { "name": "libopenssl-3-devel-32bit-3.0.8-150400.4.26.1.x86_64 as component of openSUSE Leap 15.4", "product_id": "openSUSE Leap 15.4:libopenssl-3-devel-32bit-3.0.8-150400.4.26.1.x86_64" }, "product_reference": "libopenssl-3-devel-32bit-3.0.8-150400.4.26.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.4" }, { "category": "default_component_of", "full_product_name": { "name": "libopenssl3-3.0.8-150400.4.26.1.aarch64 as component of openSUSE Leap 15.4", "product_id": "openSUSE Leap 15.4:libopenssl3-3.0.8-150400.4.26.1.aarch64" }, "product_reference": "libopenssl3-3.0.8-150400.4.26.1.aarch64", "relates_to_product_reference": "openSUSE Leap 15.4" }, { "category": "default_component_of", "full_product_name": { "name": "libopenssl3-3.0.8-150400.4.26.1.ppc64le as component of openSUSE Leap 15.4", "product_id": "openSUSE Leap 15.4:libopenssl3-3.0.8-150400.4.26.1.ppc64le" }, "product_reference": "libopenssl3-3.0.8-150400.4.26.1.ppc64le", "relates_to_product_reference": "openSUSE Leap 15.4" }, { "category": "default_component_of", "full_product_name": { "name": "libopenssl3-3.0.8-150400.4.26.1.s390x as component of openSUSE Leap 15.4", "product_id": "openSUSE Leap 15.4:libopenssl3-3.0.8-150400.4.26.1.s390x" }, "product_reference": "libopenssl3-3.0.8-150400.4.26.1.s390x", "relates_to_product_reference": "openSUSE Leap 15.4" }, { "category": "default_component_of", "full_product_name": { "name": "libopenssl3-3.0.8-150400.4.26.1.x86_64 as component of openSUSE Leap 15.4", "product_id": "openSUSE Leap 15.4:libopenssl3-3.0.8-150400.4.26.1.x86_64" }, "product_reference": "libopenssl3-3.0.8-150400.4.26.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.4" }, { "category": "default_component_of", "full_product_name": { "name": "libopenssl3-32bit-3.0.8-150400.4.26.1.x86_64 as component of openSUSE Leap 15.4", "product_id": "openSUSE Leap 15.4:libopenssl3-32bit-3.0.8-150400.4.26.1.x86_64" }, "product_reference": "libopenssl3-32bit-3.0.8-150400.4.26.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.4" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-3-3.0.8-150400.4.26.1.aarch64 as component of openSUSE Leap 15.4", "product_id": "openSUSE Leap 15.4:openssl-3-3.0.8-150400.4.26.1.aarch64" }, "product_reference": "openssl-3-3.0.8-150400.4.26.1.aarch64", "relates_to_product_reference": "openSUSE Leap 15.4" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-3-3.0.8-150400.4.26.1.ppc64le as component of openSUSE Leap 15.4", "product_id": "openSUSE Leap 15.4:openssl-3-3.0.8-150400.4.26.1.ppc64le" }, "product_reference": "openssl-3-3.0.8-150400.4.26.1.ppc64le", "relates_to_product_reference": "openSUSE Leap 15.4" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-3-3.0.8-150400.4.26.1.s390x as component of openSUSE Leap 15.4", "product_id": "openSUSE Leap 15.4:openssl-3-3.0.8-150400.4.26.1.s390x" }, "product_reference": "openssl-3-3.0.8-150400.4.26.1.s390x", "relates_to_product_reference": "openSUSE Leap 15.4" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-3-3.0.8-150400.4.26.1.x86_64 as component of openSUSE Leap 15.4", "product_id": "openSUSE Leap 15.4:openssl-3-3.0.8-150400.4.26.1.x86_64" }, "product_reference": "openssl-3-3.0.8-150400.4.26.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.4" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-3-doc-3.0.8-150400.4.26.1.noarch as component of openSUSE Leap 15.4", "product_id": "openSUSE Leap 15.4:openssl-3-doc-3.0.8-150400.4.26.1.noarch" }, "product_reference": "openssl-3-doc-3.0.8-150400.4.26.1.noarch", "relates_to_product_reference": "openSUSE Leap 15.4" } ] }, "vulnerabilities": [ { "cve": "CVE-2022-40735", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-40735" } ], "notes": [ { "category": "general", "text": "The Diffie-Hellman Key Agreement Protocol allows use of long exponents that arguably make certain calculations unnecessarily expensive, because the 1996 van Oorschot and Wiener paper found that \"(appropriately) short exponents\" can be used when there are adequate subgroup constraints, and these short exponents can lead to less expensive calculations than for long exponents. This issue is different from CVE-2002-20001 because it is based on an observation about exponent size, rather than an observation about numbers that are not public keys. The specific situations in which calculation expense would constitute a server-side vulnerability depend on the protocol (e.g., TLS, SSH, or IKE) and the DHE implementation details. In general, there might be an availability concern because of server-side resource consumption from DHE modular-exponentiation calculations. Finally, it is possible for an attacker to exploit this vulnerability and CVE-2002-20001 together.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Basesystem 15 SP4:libopenssl-3-devel-3.0.8-150400.4.26.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:libopenssl-3-devel-3.0.8-150400.4.26.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:libopenssl-3-devel-3.0.8-150400.4.26.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:libopenssl-3-devel-3.0.8-150400.4.26.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:libopenssl3-3.0.8-150400.4.26.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:libopenssl3-3.0.8-150400.4.26.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:libopenssl3-3.0.8-150400.4.26.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:libopenssl3-3.0.8-150400.4.26.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:openssl-3-3.0.8-150400.4.26.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:openssl-3-3.0.8-150400.4.26.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:openssl-3-3.0.8-150400.4.26.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:openssl-3-3.0.8-150400.4.26.1.x86_64", "openSUSE Leap 15.4:libopenssl-3-devel-3.0.8-150400.4.26.1.aarch64", "openSUSE Leap 15.4:libopenssl-3-devel-3.0.8-150400.4.26.1.ppc64le", "openSUSE Leap 15.4:libopenssl-3-devel-3.0.8-150400.4.26.1.s390x", "openSUSE Leap 15.4:libopenssl-3-devel-3.0.8-150400.4.26.1.x86_64", "openSUSE Leap 15.4:libopenssl-3-devel-32bit-3.0.8-150400.4.26.1.x86_64", "openSUSE Leap 15.4:libopenssl3-3.0.8-150400.4.26.1.aarch64", "openSUSE Leap 15.4:libopenssl3-3.0.8-150400.4.26.1.ppc64le", "openSUSE Leap 15.4:libopenssl3-3.0.8-150400.4.26.1.s390x", "openSUSE Leap 15.4:libopenssl3-3.0.8-150400.4.26.1.x86_64", "openSUSE Leap 15.4:libopenssl3-32bit-3.0.8-150400.4.26.1.x86_64", "openSUSE Leap 15.4:openssl-3-3.0.8-150400.4.26.1.aarch64", "openSUSE Leap 15.4:openssl-3-3.0.8-150400.4.26.1.ppc64le", "openSUSE Leap 15.4:openssl-3-3.0.8-150400.4.26.1.s390x", "openSUSE Leap 15.4:openssl-3-3.0.8-150400.4.26.1.x86_64", "openSUSE Leap 15.4:openssl-3-doc-3.0.8-150400.4.26.1.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2022-40735", "url": "https://www.suse.com/security/cve/CVE-2022-40735" }, { "category": "external", "summary": "SUSE Bug 1205476 for CVE-2022-40735", "url": "https://bugzilla.suse.com/1205476" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Basesystem 15 SP4:libopenssl-3-devel-3.0.8-150400.4.26.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:libopenssl-3-devel-3.0.8-150400.4.26.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:libopenssl-3-devel-3.0.8-150400.4.26.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:libopenssl-3-devel-3.0.8-150400.4.26.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:libopenssl3-3.0.8-150400.4.26.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:libopenssl3-3.0.8-150400.4.26.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:libopenssl3-3.0.8-150400.4.26.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:libopenssl3-3.0.8-150400.4.26.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:openssl-3-3.0.8-150400.4.26.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:openssl-3-3.0.8-150400.4.26.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:openssl-3-3.0.8-150400.4.26.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:openssl-3-3.0.8-150400.4.26.1.x86_64", "openSUSE Leap 15.4:libopenssl-3-devel-3.0.8-150400.4.26.1.aarch64", "openSUSE Leap 15.4:libopenssl-3-devel-3.0.8-150400.4.26.1.ppc64le", "openSUSE Leap 15.4:libopenssl-3-devel-3.0.8-150400.4.26.1.s390x", "openSUSE Leap 15.4:libopenssl-3-devel-3.0.8-150400.4.26.1.x86_64", "openSUSE Leap 15.4:libopenssl-3-devel-32bit-3.0.8-150400.4.26.1.x86_64", "openSUSE Leap 15.4:libopenssl3-3.0.8-150400.4.26.1.aarch64", "openSUSE Leap 15.4:libopenssl3-3.0.8-150400.4.26.1.ppc64le", "openSUSE Leap 15.4:libopenssl3-3.0.8-150400.4.26.1.s390x", "openSUSE Leap 15.4:libopenssl3-3.0.8-150400.4.26.1.x86_64", "openSUSE Leap 15.4:libopenssl3-32bit-3.0.8-150400.4.26.1.x86_64", "openSUSE Leap 15.4:openssl-3-3.0.8-150400.4.26.1.aarch64", "openSUSE Leap 15.4:openssl-3-3.0.8-150400.4.26.1.ppc64le", "openSUSE Leap 15.4:openssl-3-3.0.8-150400.4.26.1.s390x", "openSUSE Leap 15.4:openssl-3-3.0.8-150400.4.26.1.x86_64", "openSUSE Leap 15.4:openssl-3-doc-3.0.8-150400.4.26.1.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Basesystem 15 SP4:libopenssl-3-devel-3.0.8-150400.4.26.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:libopenssl-3-devel-3.0.8-150400.4.26.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:libopenssl-3-devel-3.0.8-150400.4.26.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:libopenssl-3-devel-3.0.8-150400.4.26.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:libopenssl3-3.0.8-150400.4.26.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:libopenssl3-3.0.8-150400.4.26.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:libopenssl3-3.0.8-150400.4.26.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:libopenssl3-3.0.8-150400.4.26.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:openssl-3-3.0.8-150400.4.26.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:openssl-3-3.0.8-150400.4.26.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:openssl-3-3.0.8-150400.4.26.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:openssl-3-3.0.8-150400.4.26.1.x86_64", "openSUSE Leap 15.4:libopenssl-3-devel-3.0.8-150400.4.26.1.aarch64", "openSUSE Leap 15.4:libopenssl-3-devel-3.0.8-150400.4.26.1.ppc64le", "openSUSE Leap 15.4:libopenssl-3-devel-3.0.8-150400.4.26.1.s390x", "openSUSE Leap 15.4:libopenssl-3-devel-3.0.8-150400.4.26.1.x86_64", "openSUSE Leap 15.4:libopenssl-3-devel-32bit-3.0.8-150400.4.26.1.x86_64", "openSUSE Leap 15.4:libopenssl3-3.0.8-150400.4.26.1.aarch64", "openSUSE Leap 15.4:libopenssl3-3.0.8-150400.4.26.1.ppc64le", "openSUSE Leap 15.4:libopenssl3-3.0.8-150400.4.26.1.s390x", "openSUSE Leap 15.4:libopenssl3-3.0.8-150400.4.26.1.x86_64", "openSUSE Leap 15.4:libopenssl3-32bit-3.0.8-150400.4.26.1.x86_64", "openSUSE Leap 15.4:openssl-3-3.0.8-150400.4.26.1.aarch64", "openSUSE Leap 15.4:openssl-3-3.0.8-150400.4.26.1.ppc64le", "openSUSE Leap 15.4:openssl-3-3.0.8-150400.4.26.1.s390x", "openSUSE Leap 15.4:openssl-3-3.0.8-150400.4.26.1.x86_64", "openSUSE Leap 15.4:openssl-3-doc-3.0.8-150400.4.26.1.noarch" ] } ], "threats": [ { "category": "impact", "date": "2023-06-08T07:47:42Z", "details": "important" } ], "title": "CVE-2022-40735" }, { "cve": "CVE-2023-1255", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-1255" } ], "notes": [ { "category": "general", "text": "Issue summary: The AES-XTS cipher decryption implementation for 64 bit ARM\nplatform contains a bug that could cause it to read past the input buffer,\nleading to a crash.\n\nImpact summary: Applications that use the AES-XTS algorithm on the 64 bit ARM\nplatform can crash in rare circumstances. The AES-XTS algorithm is usually\nused for disk encryption.\n\nThe AES-XTS cipher decryption implementation for 64 bit ARM platform will read\npast the end of the ciphertext buffer if the ciphertext size is 4 mod 5 in 16\nbyte blocks, e.g. 144 bytes or 1024 bytes. If the memory after the ciphertext\nbuffer is unmapped, this will trigger a crash which results in a denial of\nservice.\n\nIf an attacker can control the size and location of the ciphertext buffer\nbeing decrypted by an application using AES-XTS on 64 bit ARM, the\napplication is affected. This is fairly unlikely making this issue\na Low severity one.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Basesystem 15 SP4:libopenssl-3-devel-3.0.8-150400.4.26.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:libopenssl-3-devel-3.0.8-150400.4.26.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:libopenssl-3-devel-3.0.8-150400.4.26.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:libopenssl-3-devel-3.0.8-150400.4.26.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:libopenssl3-3.0.8-150400.4.26.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:libopenssl3-3.0.8-150400.4.26.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:libopenssl3-3.0.8-150400.4.26.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:libopenssl3-3.0.8-150400.4.26.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:openssl-3-3.0.8-150400.4.26.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:openssl-3-3.0.8-150400.4.26.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:openssl-3-3.0.8-150400.4.26.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:openssl-3-3.0.8-150400.4.26.1.x86_64", "openSUSE Leap 15.4:libopenssl-3-devel-3.0.8-150400.4.26.1.aarch64", "openSUSE Leap 15.4:libopenssl-3-devel-3.0.8-150400.4.26.1.ppc64le", "openSUSE Leap 15.4:libopenssl-3-devel-3.0.8-150400.4.26.1.s390x", "openSUSE Leap 15.4:libopenssl-3-devel-3.0.8-150400.4.26.1.x86_64", "openSUSE Leap 15.4:libopenssl-3-devel-32bit-3.0.8-150400.4.26.1.x86_64", "openSUSE Leap 15.4:libopenssl3-3.0.8-150400.4.26.1.aarch64", "openSUSE Leap 15.4:libopenssl3-3.0.8-150400.4.26.1.ppc64le", "openSUSE Leap 15.4:libopenssl3-3.0.8-150400.4.26.1.s390x", "openSUSE Leap 15.4:libopenssl3-3.0.8-150400.4.26.1.x86_64", "openSUSE Leap 15.4:libopenssl3-32bit-3.0.8-150400.4.26.1.x86_64", "openSUSE Leap 15.4:openssl-3-3.0.8-150400.4.26.1.aarch64", "openSUSE Leap 15.4:openssl-3-3.0.8-150400.4.26.1.ppc64le", "openSUSE Leap 15.4:openssl-3-3.0.8-150400.4.26.1.s390x", "openSUSE Leap 15.4:openssl-3-3.0.8-150400.4.26.1.x86_64", "openSUSE Leap 15.4:openssl-3-doc-3.0.8-150400.4.26.1.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2023-1255", "url": "https://www.suse.com/security/cve/CVE-2023-1255" }, { "category": "external", "summary": "SUSE Bug 1210714 for CVE-2023-1255", "url": "https://bugzilla.suse.com/1210714" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Basesystem 15 SP4:libopenssl-3-devel-3.0.8-150400.4.26.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:libopenssl-3-devel-3.0.8-150400.4.26.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:libopenssl-3-devel-3.0.8-150400.4.26.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:libopenssl-3-devel-3.0.8-150400.4.26.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:libopenssl3-3.0.8-150400.4.26.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:libopenssl3-3.0.8-150400.4.26.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:libopenssl3-3.0.8-150400.4.26.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:libopenssl3-3.0.8-150400.4.26.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:openssl-3-3.0.8-150400.4.26.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:openssl-3-3.0.8-150400.4.26.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:openssl-3-3.0.8-150400.4.26.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:openssl-3-3.0.8-150400.4.26.1.x86_64", "openSUSE Leap 15.4:libopenssl-3-devel-3.0.8-150400.4.26.1.aarch64", "openSUSE Leap 15.4:libopenssl-3-devel-3.0.8-150400.4.26.1.ppc64le", "openSUSE Leap 15.4:libopenssl-3-devel-3.0.8-150400.4.26.1.s390x", "openSUSE Leap 15.4:libopenssl-3-devel-3.0.8-150400.4.26.1.x86_64", "openSUSE Leap 15.4:libopenssl-3-devel-32bit-3.0.8-150400.4.26.1.x86_64", "openSUSE Leap 15.4:libopenssl3-3.0.8-150400.4.26.1.aarch64", "openSUSE Leap 15.4:libopenssl3-3.0.8-150400.4.26.1.ppc64le", "openSUSE Leap 15.4:libopenssl3-3.0.8-150400.4.26.1.s390x", "openSUSE Leap 15.4:libopenssl3-3.0.8-150400.4.26.1.x86_64", "openSUSE Leap 15.4:libopenssl3-32bit-3.0.8-150400.4.26.1.x86_64", "openSUSE Leap 15.4:openssl-3-3.0.8-150400.4.26.1.aarch64", "openSUSE Leap 15.4:openssl-3-3.0.8-150400.4.26.1.ppc64le", "openSUSE Leap 15.4:openssl-3-3.0.8-150400.4.26.1.s390x", "openSUSE Leap 15.4:openssl-3-3.0.8-150400.4.26.1.x86_64", "openSUSE Leap 15.4:openssl-3-doc-3.0.8-150400.4.26.1.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Basesystem 15 SP4:libopenssl-3-devel-3.0.8-150400.4.26.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:libopenssl-3-devel-3.0.8-150400.4.26.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:libopenssl-3-devel-3.0.8-150400.4.26.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:libopenssl-3-devel-3.0.8-150400.4.26.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:libopenssl3-3.0.8-150400.4.26.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:libopenssl3-3.0.8-150400.4.26.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:libopenssl3-3.0.8-150400.4.26.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:libopenssl3-3.0.8-150400.4.26.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:openssl-3-3.0.8-150400.4.26.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:openssl-3-3.0.8-150400.4.26.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:openssl-3-3.0.8-150400.4.26.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:openssl-3-3.0.8-150400.4.26.1.x86_64", "openSUSE Leap 15.4:libopenssl-3-devel-3.0.8-150400.4.26.1.aarch64", "openSUSE Leap 15.4:libopenssl-3-devel-3.0.8-150400.4.26.1.ppc64le", "openSUSE Leap 15.4:libopenssl-3-devel-3.0.8-150400.4.26.1.s390x", "openSUSE Leap 15.4:libopenssl-3-devel-3.0.8-150400.4.26.1.x86_64", "openSUSE Leap 15.4:libopenssl-3-devel-32bit-3.0.8-150400.4.26.1.x86_64", "openSUSE Leap 15.4:libopenssl3-3.0.8-150400.4.26.1.aarch64", "openSUSE Leap 15.4:libopenssl3-3.0.8-150400.4.26.1.ppc64le", "openSUSE Leap 15.4:libopenssl3-3.0.8-150400.4.26.1.s390x", "openSUSE Leap 15.4:libopenssl3-3.0.8-150400.4.26.1.x86_64", "openSUSE Leap 15.4:libopenssl3-32bit-3.0.8-150400.4.26.1.x86_64", "openSUSE Leap 15.4:openssl-3-3.0.8-150400.4.26.1.aarch64", "openSUSE Leap 15.4:openssl-3-3.0.8-150400.4.26.1.ppc64le", "openSUSE Leap 15.4:openssl-3-3.0.8-150400.4.26.1.s390x", "openSUSE Leap 15.4:openssl-3-3.0.8-150400.4.26.1.x86_64", "openSUSE Leap 15.4:openssl-3-doc-3.0.8-150400.4.26.1.noarch" ] } ], "threats": [ { "category": "impact", "date": "2023-06-08T07:47:42Z", "details": "moderate" } ], "title": "CVE-2023-1255" }, { "cve": "CVE-2023-2650", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-2650" } ], "notes": [ { "category": "general", "text": "Issue summary: Processing some specially crafted ASN.1 object identifiers or\ndata containing them may be very slow.\n\nImpact summary: Applications that use OBJ_obj2txt() directly, or use any of\nthe OpenSSL subsystems OCSP, PKCS7/SMIME, CMS, CMP/CRMF or TS with no message\nsize limit may experience notable to very long delays when processing those\nmessages, which may lead to a Denial of Service.\n\nAn OBJECT IDENTIFIER is composed of a series of numbers - sub-identifiers -\nmost of which have no size limit. OBJ_obj2txt() may be used to translate\nan ASN.1 OBJECT IDENTIFIER given in DER encoding form (using the OpenSSL\ntype ASN1_OBJECT) to its canonical numeric text form, which are the\nsub-identifiers of the OBJECT IDENTIFIER in decimal form, separated by\nperiods.\n\nWhen one of the sub-identifiers in the OBJECT IDENTIFIER is very large\n(these are sizes that are seen as absurdly large, taking up tens or hundreds\nof KiBs), the translation to a decimal number in text may take a very long\ntime. The time complexity is O(n^2) with \u0027n\u0027 being the size of the\nsub-identifiers in bytes (*).\n\nWith OpenSSL 3.0, support to fetch cryptographic algorithms using names /\nidentifiers in string form was introduced. This includes using OBJECT\nIDENTIFIERs in canonical numeric text form as identifiers for fetching\nalgorithms.\n\nSuch OBJECT IDENTIFIERs may be received through the ASN.1 structure\nAlgorithmIdentifier, which is commonly used in multiple protocols to specify\nwhat cryptographic algorithm should be used to sign or verify, encrypt or\ndecrypt, or digest passed data.\n\nApplications that call OBJ_obj2txt() directly with untrusted data are\naffected, with any version of OpenSSL. If the use is for the mere purpose\nof display, the severity is considered low.\n\nIn OpenSSL 3.0 and newer, this affects the subsystems OCSP, PKCS7/SMIME,\nCMS, CMP/CRMF or TS. It also impacts anything that processes X.509\ncertificates, including simple things like verifying its signature.\n\nThe impact on TLS is relatively low, because all versions of OpenSSL have a\n100KiB limit on the peer\u0027s certificate chain. Additionally, this only\nimpacts clients, or servers that have explicitly enabled client\nauthentication.\n\nIn OpenSSL 1.1.1 and 1.0.2, this only affects displaying diverse objects,\nsuch as X.509 certificates. This is assumed to not happen in such a way\nthat it would cause a Denial of Service, so these versions are considered\nnot affected by this issue in such a way that it would be cause for concern,\nand the severity is therefore considered low.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Basesystem 15 SP4:libopenssl-3-devel-3.0.8-150400.4.26.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:libopenssl-3-devel-3.0.8-150400.4.26.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:libopenssl-3-devel-3.0.8-150400.4.26.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:libopenssl-3-devel-3.0.8-150400.4.26.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:libopenssl3-3.0.8-150400.4.26.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:libopenssl3-3.0.8-150400.4.26.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:libopenssl3-3.0.8-150400.4.26.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:libopenssl3-3.0.8-150400.4.26.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:openssl-3-3.0.8-150400.4.26.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:openssl-3-3.0.8-150400.4.26.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:openssl-3-3.0.8-150400.4.26.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:openssl-3-3.0.8-150400.4.26.1.x86_64", "openSUSE Leap 15.4:libopenssl-3-devel-3.0.8-150400.4.26.1.aarch64", "openSUSE Leap 15.4:libopenssl-3-devel-3.0.8-150400.4.26.1.ppc64le", "openSUSE Leap 15.4:libopenssl-3-devel-3.0.8-150400.4.26.1.s390x", "openSUSE Leap 15.4:libopenssl-3-devel-3.0.8-150400.4.26.1.x86_64", "openSUSE Leap 15.4:libopenssl-3-devel-32bit-3.0.8-150400.4.26.1.x86_64", "openSUSE Leap 15.4:libopenssl3-3.0.8-150400.4.26.1.aarch64", "openSUSE Leap 15.4:libopenssl3-3.0.8-150400.4.26.1.ppc64le", "openSUSE Leap 15.4:libopenssl3-3.0.8-150400.4.26.1.s390x", "openSUSE Leap 15.4:libopenssl3-3.0.8-150400.4.26.1.x86_64", "openSUSE Leap 15.4:libopenssl3-32bit-3.0.8-150400.4.26.1.x86_64", "openSUSE Leap 15.4:openssl-3-3.0.8-150400.4.26.1.aarch64", "openSUSE Leap 15.4:openssl-3-3.0.8-150400.4.26.1.ppc64le", "openSUSE Leap 15.4:openssl-3-3.0.8-150400.4.26.1.s390x", "openSUSE Leap 15.4:openssl-3-3.0.8-150400.4.26.1.x86_64", "openSUSE Leap 15.4:openssl-3-doc-3.0.8-150400.4.26.1.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2023-2650", "url": "https://www.suse.com/security/cve/CVE-2023-2650" }, { "category": "external", "summary": "SUSE Bug 1211430 for CVE-2023-2650", "url": "https://bugzilla.suse.com/1211430" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Basesystem 15 SP4:libopenssl-3-devel-3.0.8-150400.4.26.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:libopenssl-3-devel-3.0.8-150400.4.26.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:libopenssl-3-devel-3.0.8-150400.4.26.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:libopenssl-3-devel-3.0.8-150400.4.26.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:libopenssl3-3.0.8-150400.4.26.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:libopenssl3-3.0.8-150400.4.26.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:libopenssl3-3.0.8-150400.4.26.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:libopenssl3-3.0.8-150400.4.26.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:openssl-3-3.0.8-150400.4.26.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:openssl-3-3.0.8-150400.4.26.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:openssl-3-3.0.8-150400.4.26.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:openssl-3-3.0.8-150400.4.26.1.x86_64", "openSUSE Leap 15.4:libopenssl-3-devel-3.0.8-150400.4.26.1.aarch64", "openSUSE Leap 15.4:libopenssl-3-devel-3.0.8-150400.4.26.1.ppc64le", "openSUSE Leap 15.4:libopenssl-3-devel-3.0.8-150400.4.26.1.s390x", "openSUSE Leap 15.4:libopenssl-3-devel-3.0.8-150400.4.26.1.x86_64", "openSUSE Leap 15.4:libopenssl-3-devel-32bit-3.0.8-150400.4.26.1.x86_64", "openSUSE Leap 15.4:libopenssl3-3.0.8-150400.4.26.1.aarch64", "openSUSE Leap 15.4:libopenssl3-3.0.8-150400.4.26.1.ppc64le", "openSUSE Leap 15.4:libopenssl3-3.0.8-150400.4.26.1.s390x", "openSUSE Leap 15.4:libopenssl3-3.0.8-150400.4.26.1.x86_64", "openSUSE Leap 15.4:libopenssl3-32bit-3.0.8-150400.4.26.1.x86_64", "openSUSE Leap 15.4:openssl-3-3.0.8-150400.4.26.1.aarch64", "openSUSE Leap 15.4:openssl-3-3.0.8-150400.4.26.1.ppc64le", "openSUSE Leap 15.4:openssl-3-3.0.8-150400.4.26.1.s390x", "openSUSE Leap 15.4:openssl-3-3.0.8-150400.4.26.1.x86_64", "openSUSE Leap 15.4:openssl-3-doc-3.0.8-150400.4.26.1.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Basesystem 15 SP4:libopenssl-3-devel-3.0.8-150400.4.26.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:libopenssl-3-devel-3.0.8-150400.4.26.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:libopenssl-3-devel-3.0.8-150400.4.26.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:libopenssl-3-devel-3.0.8-150400.4.26.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:libopenssl3-3.0.8-150400.4.26.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:libopenssl3-3.0.8-150400.4.26.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:libopenssl3-3.0.8-150400.4.26.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:libopenssl3-3.0.8-150400.4.26.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:openssl-3-3.0.8-150400.4.26.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:openssl-3-3.0.8-150400.4.26.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:openssl-3-3.0.8-150400.4.26.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:openssl-3-3.0.8-150400.4.26.1.x86_64", "openSUSE Leap 15.4:libopenssl-3-devel-3.0.8-150400.4.26.1.aarch64", "openSUSE Leap 15.4:libopenssl-3-devel-3.0.8-150400.4.26.1.ppc64le", "openSUSE Leap 15.4:libopenssl-3-devel-3.0.8-150400.4.26.1.s390x", "openSUSE Leap 15.4:libopenssl-3-devel-3.0.8-150400.4.26.1.x86_64", "openSUSE Leap 15.4:libopenssl-3-devel-32bit-3.0.8-150400.4.26.1.x86_64", "openSUSE Leap 15.4:libopenssl3-3.0.8-150400.4.26.1.aarch64", "openSUSE Leap 15.4:libopenssl3-3.0.8-150400.4.26.1.ppc64le", "openSUSE Leap 15.4:libopenssl3-3.0.8-150400.4.26.1.s390x", "openSUSE Leap 15.4:libopenssl3-3.0.8-150400.4.26.1.x86_64", "openSUSE Leap 15.4:libopenssl3-32bit-3.0.8-150400.4.26.1.x86_64", "openSUSE Leap 15.4:openssl-3-3.0.8-150400.4.26.1.aarch64", "openSUSE Leap 15.4:openssl-3-3.0.8-150400.4.26.1.ppc64le", "openSUSE Leap 15.4:openssl-3-3.0.8-150400.4.26.1.s390x", "openSUSE Leap 15.4:openssl-3-3.0.8-150400.4.26.1.x86_64", "openSUSE Leap 15.4:openssl-3-doc-3.0.8-150400.4.26.1.noarch" ] } ], "threats": [ { "category": "impact", "date": "2023-06-08T07:47:42Z", "details": "moderate" } ], "title": "CVE-2023-2650" } ] }
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.