fkie_cve-2023-3817
Vulnerability from fkie_nvd
Published
2023-07-31 16:15
Modified
2025-05-05 16:15
Severity ?
5.3 (Medium) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
5.3 (Medium) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
5.3 (Medium) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
Summary
Issue summary: Checking excessively long DH keys or parameters may be very slow.
Impact summary: Applications that use the functions DH_check(), DH_check_ex()
or EVP_PKEY_param_check() to check a DH key or DH parameters may experience long
delays. Where the key or parameters that are being checked have been obtained
from an untrusted source this may lead to a Denial of Service.
The function DH_check() performs various checks on DH parameters. After fixing
CVE-2023-3446 it was discovered that a large q parameter value can also trigger
an overly long computation during some of these checks. A correct q value,
if present, cannot be larger than the modulus p parameter, thus it is
unnecessary to perform these checks if q is larger than p.
An application that calls DH_check() and supplies a key or parameters obtained
from an untrusted source could be vulnerable to a Denial of Service attack.
The function DH_check() is itself called by a number of other OpenSSL functions.
An application calling any of those other functions may similarly be affected.
The other functions affected by this are DH_check_ex() and
EVP_PKEY_param_check().
Also vulnerable are the OpenSSL dhparam and pkeyparam command line applications
when using the "-check" option.
The OpenSSL SSL/TLS implementation is not affected by this issue.
The OpenSSL 3.0 and 3.1 FIPS providers are not affected by this issue.
References
Impacted products
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:openssl:openssl:*:*:*:*:*:*:*:*",
"matchCriteriaId": "E327FF28-8035-4914-B7D9-F96780BD9C5E",
"versionEndExcluding": "3.0.10",
"versionStartIncluding": "3.0.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:openssl:openssl:*:*:*:*:*:*:*:*",
"matchCriteriaId": "9BA338C8-1C98-4928-9661-BC82501A8972",
"versionEndExcluding": "3.1.2",
"versionStartIncluding": "3.1.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:openssl:openssl:1.0.2:-:*:*:*:*:*:*",
"matchCriteriaId": "CF0E6EB1-D656-458E-82B6-8C1ABDC13CB9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:openssl:openssl:1.0.2:beta1:*:*:*:*:*:*",
"matchCriteriaId": "18797BEE-417D-4959-9AAD-C5A7C051B524",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:openssl:openssl:1.0.2:beta2:*:*:*:*:*:*",
"matchCriteriaId": "6FAA3C31-BD9D-45A9-A502-837FECA6D479",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:openssl:openssl:1.0.2:beta3:*:*:*:*:*:*",
"matchCriteriaId": "6455A421-9956-4846-AC7C-3431E0D37D23",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:openssl:openssl:1.0.2a:*:*:*:*:*:*:*",
"matchCriteriaId": "60F946FD-F564-49DA-B043-5943308BA9EE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:openssl:openssl:1.0.2b:*:*:*:*:*:*:*",
"matchCriteriaId": "4847BCF3-EFCE-41AF-8E7D-3D51EB9DCC5B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:openssl:openssl:1.0.2c:*:*:*:*:*:*:*",
"matchCriteriaId": "9B89180B-FB68-4DD8-B076-16E51CC7FB91",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:openssl:openssl:1.0.2d:*:*:*:*:*:*:*",
"matchCriteriaId": "4C986592-4086-4A39-9767-EF34DBAA6A53",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:openssl:openssl:1.0.2e:*:*:*:*:*:*:*",
"matchCriteriaId": "7B23181C-03DB-4E92-B3F6-6B585B5231B4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:openssl:openssl:1.0.2f:*:*:*:*:*:*:*",
"matchCriteriaId": "94D9EC1C-4843-4026-9B05-E060E9391734",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:openssl:openssl:1.0.2g:*:*:*:*:*:*:*",
"matchCriteriaId": "B066401C-21CF-4BE9-9C55-C9F1E0C7BE3F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:openssl:openssl:1.0.2h:*:*:*:*:*:*:*",
"matchCriteriaId": "036FB24F-7D86-4730-8BC9-722875BEC807",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:openssl:openssl:1.0.2i:*:*:*:*:*:*:*",
"matchCriteriaId": "FDF148A3-1AA7-4F27-85AB-414C609C626F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:openssl:openssl:1.0.2j:*:*:*:*:*:*:*",
"matchCriteriaId": "E15B749E-6808-4788-AE42-7A1587D8697E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:openssl:openssl:1.0.2k:*:*:*:*:*:*:*",
"matchCriteriaId": "58F80C8D-BCA2-40AD-BD22-B70C7BE1B298",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:openssl:openssl:1.0.2l:*:*:*:*:*:*:*",
"matchCriteriaId": "70B78EDF-6BB7-42C4-9423-9332C62C6E43",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:openssl:openssl:1.0.2m:*:*:*:*:*:*:*",
"matchCriteriaId": "E2354F82-A01B-43D2-84F4-4E94B258E091",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:openssl:openssl:1.0.2n:*:*:*:*:*:*:*",
"matchCriteriaId": "59AAE340-19BC-4879-AC48-9F4F338A3B61",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:openssl:openssl:1.0.2o:*:*:*:*:*:*:*",
"matchCriteriaId": "6264EB97-9FBE-4DEB-A81D-EA0B2E4437FF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:openssl:openssl:1.0.2p:*:*:*:*:*:*:*",
"matchCriteriaId": "59B58D80-485A-4CBD-9220-D6FDBD6FEE65",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:openssl:openssl:1.0.2q:*:*:*:*:*:*:*",
"matchCriteriaId": "9B1131CC-526D-45FF-ABEB-164100D0BE0D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:openssl:openssl:1.0.2r:*:*:*:*:*:*:*",
"matchCriteriaId": "0739C502-4EDB-4D08-B2B9-04FAB98AFE02",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:openssl:openssl:1.0.2s:*:*:*:*:*:*:*",
"matchCriteriaId": "AB045D51-DAD7-44E1-BA80-4C90F0F4335F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:openssl:openssl:1.0.2t:*:*:*:*:*:*:*",
"matchCriteriaId": "5A745BE4-2249-4251-8AD1-43F0F7EF2755",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:openssl:openssl:1.0.2u:*:*:*:*:*:*:*",
"matchCriteriaId": "DAEB85A6-B9F9-4EC1-942F-7E17A3854600",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:openssl:openssl:1.0.2v:*:*:*:*:*:*:*",
"matchCriteriaId": "7D6D42CF-82FC-4A6F-9C4C-6DBF9470CABB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:openssl:openssl:1.0.2w:*:*:*:*:*:*:*",
"matchCriteriaId": "A6029EAB-8DDE-4995-AFC8-4C17BDEC8DFF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:openssl:openssl:1.0.2x:*:*:*:*:*:*:*",
"matchCriteriaId": "EF8EEF0A-623B-46A8-9C0D-F5EC490128DC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:openssl:openssl:1.0.2y:*:*:*:*:*:*:*",
"matchCriteriaId": "024263ED-A240-4447-8926-E9D1EF4792E7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:openssl:openssl:1.0.2za:*:*:*:*:*:*:*",
"matchCriteriaId": "EEAC4D67-2D2A-45EF-8693-1D90EEC818EC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:openssl:openssl:1.0.2zb:*:*:*:*:*:*:*",
"matchCriteriaId": "A6852B09-CC89-4F9C-8245-59AD2C797AC1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:openssl:openssl:1.0.2zc:*:*:*:*:*:*:*",
"matchCriteriaId": "3A7A844C-EB18-443B-8B33-86C98BFF683E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:openssl:openssl:1.0.2zd:*:*:*:*:*:*:*",
"matchCriteriaId": "8538CCF3-19C0-4E55-B5F7-AC07A1D68E2C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:openssl:openssl:1.0.2ze:*:*:*:*:*:*:*",
"matchCriteriaId": "3CCDDB86-9910-4251-91B0-D56EDE93BF49",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:openssl:openssl:1.0.2zf:*:*:*:*:*:*:*",
"matchCriteriaId": "96BA4105-67FF-43BD-A655-7F5741AD8F8F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:openssl:openssl:1.0.2zg:*:*:*:*:*:*:*",
"matchCriteriaId": "DC2EEB54-2A48-4DB7-B95C-4B5072B98858",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:openssl:openssl:1.0.2zh:*:*:*:*:*:*:*",
"matchCriteriaId": "A32F8FD2-79D4-4349-95EF-8B2448993CAF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:openssl:openssl:1.1.1:-:*:*:*:*:*:*",
"matchCriteriaId": "A8C84061-63BE-49F6-B2F0-D96847E755E0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:openssl:openssl:1.1.1:pre1:*:*:*:*:*:*",
"matchCriteriaId": "811DBBDB-4DD9-4440-A9EC-F97B161F1E1D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:openssl:openssl:1.1.1:pre2:*:*:*:*:*:*",
"matchCriteriaId": "8A5C2FE6-8BFB-4C73-83E9-0CF230D4B452",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:openssl:openssl:1.1.1:pre3:*:*:*:*:*:*",
"matchCriteriaId": "230480C2-314E-4465-B09D-101DCC475E7C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:openssl:openssl:1.1.1:pre4:*:*:*:*:*:*",
"matchCriteriaId": "5474A1A5-81F9-4B15-B145-C327EB098740",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:openssl:openssl:1.1.1:pre5:*:*:*:*:*:*",
"matchCriteriaId": "7EEDDD3D-0598-4F1F-93CB-FAF6757BFF1B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:openssl:openssl:1.1.1:pre6:*:*:*:*:*:*",
"matchCriteriaId": "ED226FB6-07FD-4713-BEFE-94456FA6F82F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:openssl:openssl:1.1.1:pre7:*:*:*:*:*:*",
"matchCriteriaId": "11AE7A76-811B-46D0-9173-BC5A48560F67",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:openssl:openssl:1.1.1:pre8:*:*:*:*:*:*",
"matchCriteriaId": "A4955261-CCEB-472B-9535-98B0CE04A321",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:openssl:openssl:1.1.1:pre9:*:*:*:*:*:*",
"matchCriteriaId": "C36FAE41-0B70-4049-9AFA-8F762EF4FB00",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:openssl:openssl:1.1.1a:*:*:*:*:*:*:*",
"matchCriteriaId": "42649AB8-1443-4036-9873-160D913BAD68",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:openssl:openssl:1.1.1b:*:*:*:*:*:*:*",
"matchCriteriaId": "8AE4A4BC-31BE-4EC5-907C-295D98484ABB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:openssl:openssl:1.1.1c:*:*:*:*:*:*:*",
"matchCriteriaId": "D8A852AB-AE4C-4794-BE45-D49EECA9D440",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:openssl:openssl:1.1.1d:*:*:*:*:*:*:*",
"matchCriteriaId": "6B34CE8C-FF32-433B-8527-CA04E7835AC5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:openssl:openssl:1.1.1e:*:*:*:*:*:*:*",
"matchCriteriaId": "F73E774D-C6EB-4776-A847-3F331EC77204",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:openssl:openssl:1.1.1f:*:*:*:*:*:*:*",
"matchCriteriaId": "BF6D1346-43CD-41DE-9021-A98157FED8B8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:openssl:openssl:1.1.1g:*:*:*:*:*:*:*",
"matchCriteriaId": "C7364FED-4719-4EF5-8ABB-D36CBD8BE402",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:openssl:openssl:1.1.1h:*:*:*:*:*:*:*",
"matchCriteriaId": "14479639-DF33-4AB7-B781-791BF8DA8382",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:openssl:openssl:1.1.1i:*:*:*:*:*:*:*",
"matchCriteriaId": "900C1008-F297-47FD-A1BD-11A3BEFF02E0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:openssl:openssl:1.1.1j:*:*:*:*:*:*:*",
"matchCriteriaId": "AD1A1441-D118-4557-A8AA-88B20D332ED5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:openssl:openssl:1.1.1k:*:*:*:*:*:*:*",
"matchCriteriaId": "8AACE259-34C9-4100-8730-5BDA4B1B1A66",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:openssl:openssl:1.1.1l:*:*:*:*:*:*:*",
"matchCriteriaId": "BAF15ABD-322D-413F-9707-C2A4508629D7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:openssl:openssl:1.1.1m:*:*:*:*:*:*:*",
"matchCriteriaId": "69FAF390-8141-4451-9D80-76155BD4EADC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:openssl:openssl:1.1.1n:*:*:*:*:*:*:*",
"matchCriteriaId": "0A54842A-332F-4092-ABE0-F3323541BE67",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:openssl:openssl:1.1.1o:*:*:*:*:*:*:*",
"matchCriteriaId": "FB72FEE3-190B-4326-ACD0-F52110536526",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:openssl:openssl:1.1.1p:*:*:*:*:*:*:*",
"matchCriteriaId": "1AF40BB0-0C57-4BCD-815F-A3FF4EB42D14",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:openssl:openssl:1.1.1q:*:*:*:*:*:*:*",
"matchCriteriaId": "EA111F81-1347-4D7D-BA0F-88350174DAFC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:openssl:openssl:1.1.1r:*:*:*:*:*:*:*",
"matchCriteriaId": "46E4334B-6203-49B1-83E6-381E6D12DCBA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:openssl:openssl:1.1.1s:*:*:*:*:*:*:*",
"matchCriteriaId": "B76E919B-5E08-4C04-80FF-5F9DBA244B71",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:openssl:openssl:1.1.1t:*:*:*:*:*:*:*",
"matchCriteriaId": "6F1DE6C9-DCAF-4896-912D-443A32B918F6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:openssl:openssl:1.1.1u:*:*:*:*:*:*:*",
"matchCriteriaId": "C5C8A0C3-BAAF-43D7-B782-5EA17539D7EF",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Issue summary: Checking excessively long DH keys or parameters may be very slow.\n\nImpact summary: Applications that use the functions DH_check(), DH_check_ex()\nor EVP_PKEY_param_check() to check a DH key or DH parameters may experience long\ndelays. Where the key or parameters that are being checked have been obtained\nfrom an untrusted source this may lead to a Denial of Service.\n\nThe function DH_check() performs various checks on DH parameters. After fixing\nCVE-2023-3446 it was discovered that a large q parameter value can also trigger\nan overly long computation during some of these checks. A correct q value,\nif present, cannot be larger than the modulus p parameter, thus it is\nunnecessary to perform these checks if q is larger than p.\n\nAn application that calls DH_check() and supplies a key or parameters obtained\nfrom an untrusted source could be vulnerable to a Denial of Service attack.\n\nThe function DH_check() is itself called by a number of other OpenSSL functions.\nAn application calling any of those other functions may similarly be affected.\nThe other functions affected by this are DH_check_ex() and\nEVP_PKEY_param_check().\n\nAlso vulnerable are the OpenSSL dhparam and pkeyparam command line applications\nwhen using the \"-check\" option.\n\nThe OpenSSL SSL/TLS implementation is not affected by this issue.\n\nThe OpenSSL 3.0 and 3.1 FIPS providers are not affected by this issue."
}
],
"id": "CVE-2023-3817",
"lastModified": "2025-05-05T16:15:47.343",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 1.4,
"source": "nvd@nist.gov",
"type": "Primary"
},
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 1.4,
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary"
}
]
},
"published": "2023-07-31T16:15:10.497",
"references": [
{
"source": "openssl-security@openssl.org",
"tags": [
"Mailing List",
"Patch"
],
"url": "https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=6a1eb62c29db6cb5eec707f9338aee00f44e26f5"
},
{
"source": "openssl-security@openssl.org",
"tags": [
"Broken Link"
],
"url": "https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=869ad69aadd985c7b8ca6f4e5dd0eb274c9f3644"
},
{
"source": "openssl-security@openssl.org",
"tags": [
"Mailing List",
"Patch"
],
"url": "https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=9002fd07327a91f35ba6c1307e71fa6fd4409b7f"
},
{
"source": "openssl-security@openssl.org",
"tags": [
"Mailing List",
"Patch"
],
"url": "https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=91ddeba0f2269b017dc06c46c993a788974b1aa5"
},
{
"source": "openssl-security@openssl.org",
"tags": [
"Vendor Advisory"
],
"url": "https://www.openssl.org/news/secadv/20230731.txt"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://seclists.org/fulldisclosure/2023/Jul/43"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.openwall.com/lists/oss-security/2023/07/31/1"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.openwall.com/lists/oss-security/2023/09/22/11"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.openwall.com/lists/oss-security/2023/09/22/9"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.openwall.com/lists/oss-security/2023/11/06/2"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List",
"Patch"
],
"url": "https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=6a1eb62c29db6cb5eec707f9338aee00f44e26f5"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Broken Link"
],
"url": "https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=869ad69aadd985c7b8ca6f4e5dd0eb274c9f3644"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List",
"Patch"
],
"url": "https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=9002fd07327a91f35ba6c1307e71fa6fd4409b7f"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List",
"Patch"
],
"url": "https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=91ddeba0f2269b017dc06c46c993a788974b1aa5"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://lists.debian.org/debian-lts-announce/2023/08/msg00019.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://security.gentoo.org/glsa/202402-08"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://security.netapp.com/advisory/ntap-20230818-0014/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://security.netapp.com/advisory/ntap-20231027-0008/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://security.netapp.com/advisory/ntap-20240621-0006/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "https://www.openssl.org/news/secadv/20230731.txt"
}
],
"sourceIdentifier": "openssl-security@openssl.org",
"vulnStatus": "Modified",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-606"
}
],
"source": "openssl-security@openssl.org",
"type": "Secondary"
},
{
"description": [
{
"lang": "en",
"value": "CWE-834"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…
Loading…