CVE-2018-0732

During key agreement in a TLS handshake using a DH(E) based ciphersuite a malicious server can send a very large prime value to the client. This will cause the client to spend an unreasonably long period of time generating a key for this prime resulting in a hang until the client has finished. This could be exploited in a Denial Of Service attack. Fixed in OpenSSL 1.1.0i-dev (Affected 1.1.0-1.1.0h). Fixed in OpenSSL 1.0.2p-dev (Affected 1.0.2-1.0.2o).
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTNIST
7.5 HIGH
NETWORK
LOW
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
opensslCNA
---
---
CVEADP
---
---
Base Score
CVSS 3.x
EPSS Score
Percentile: 99%
VendorProductVersion
opensslopenssl
1.0.2 ≤
𝑥
≤ 1.0.2o
opensslopenssl
1.1.0 ≤
𝑥
≤ 1.1.0h
canonicalubuntu_linux
12.04
canonicalubuntu_linux
14.04
canonicalubuntu_linux
16.04
canonicalubuntu_linux
17.10
canonicalubuntu_linux
18.04
debiandebian_linux
8.0
nodejsnode.js
6.0.0 ≤
𝑥
< 6.8.1
nodejsnode.js
6.9.0 ≤
𝑥
< 6.14.4
nodejsnode.js
8.0.0 ≤
𝑥
< 8.8.1
nodejsnode.js
8.9.0 ≤
𝑥
< 8.11.4
nodejsnode.js
10.0.0 ≤
𝑥
< 10.9.0
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
openssl
bullseye
1.1.1w-0+deb11u1
fixed
bullseye (security)
1.1.1w-0+deb11u2
fixed
bookworm
3.0.14-1~deb12u1
fixed
bookworm (security)
3.0.14-1~deb12u2
fixed
sid
3.3.2-2
fixed
trixie
3.3.2-2
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
openssl
disco
Fixed 1.1.0g-2ubuntu5
released
cosmic
Fixed 1.1.0g-2ubuntu5
released
bionic
Fixed 1.1.0g-2ubuntu4.1
released
artful
Fixed 1.0.2g-1ubuntu13.6
released
xenial
Fixed 1.0.2g-1ubuntu4.13
released
trusty
Fixed 1.0.1f-1ubuntu2.26
released
openssl098
disco
dne
cosmic
dne
bionic
dne
artful
dne
xenial
dne
trusty
dne
openssl1.0
disco
dne
cosmic
Fixed 1.0.2n-1ubuntu6
released
bionic
Fixed 1.0.2n-1ubuntu5.1
released
artful
dne
xenial
dne
trusty
dne
Common Weakness Enumeration
References