CVE-2024-4603

Issue summary: Checking excessively long DSA keys or parameters may be very
slow.

Impact summary: Applications that use the functions EVP_PKEY_param_check()
or EVP_PKEY_public_check() to check a DSA public key or DSA parameters may
experience long delays. Where the key or parameters that are being checked
have been obtained from an untrusted source this may lead to a Denial of
Service.

The functions EVP_PKEY_param_check() or EVP_PKEY_public_check() perform
various checks on DSA parameters. Some of those computations take a long time
if the modulus (`p` parameter) is too large.

Trying to use a very large modulus is slow and OpenSSL will not allow using
public keys with a modulus which is over 10,000 bits in length for signature
verification. However the key and parameter check functions do not limit
the modulus size when performing the checks.

An application that calls EVP_PKEY_param_check() or EVP_PKEY_public_check()
and supplies a key or parameters obtained from an untrusted source could be
vulnerable to a Denial of Service attack.

These functions are not called by OpenSSL itself on untrusted DSA keys so
only applications that directly call these functions may be vulnerable.

Also vulnerable are the OpenSSL pkey and pkeyparam command line applications
when using the `-check` option.

The OpenSSL SSL/TLS implementation is not affected by this issue.

The OpenSSL 3.0 and 3.1 FIPS providers are affected by this issue.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTNIST
5.3 MEDIUM
NETWORK
LOW
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
opensslCNA
---
---
CVEADP
---
---
CISA-ADPADP
5.3 MEDIUM
NETWORK
LOW
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
Base Score
CVSS 3.x
EPSS Score
Percentile: 21%
VendorProductVersion
opensslopenssl
3.0.14 <
𝑥
< 3.0.14
opensslopenssl
3.1.6 <
𝑥
< 3.1.6
opensslopenssl
3.2.2 <
𝑥
< 3.2.2
opensslopenssl
3.3.1 <
𝑥
< 3.3.1
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
openssl
bullseye
1.1.1w-0+deb11u1
not-affected
buster
not-affected
bullseye (security)
1.1.1w-0+deb11u3
fixed
bookworm
3.0.16-1~deb12u1
fixed
bookworm (security)
3.0.14-1~deb12u2
fixed
trixie
3.5.0-2
fixed
sid
3.5.1-1
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
edk2
plucky
needed
oracular
ignored
noble
needed
mantic
not-affected
jammy
not-affected
focal
not-affected
bionic
not-affected
xenial
not-affected
nodejs
plucky
not-affected
oracular
not-affected
noble
not-affected
mantic
not-affected
jammy
needed
focal
not-affected
bionic
needs-triage
xenial
needs-triage
trusty
not-affected
openssl
plucky
Fixed 3.2.2-1ubuntu1
released
oracular
Fixed 3.2.2-1ubuntu1
released
noble
Fixed 3.0.13-0ubuntu3.2
released
mantic
ignored
jammy
Fixed 3.0.2-0ubuntu1.17
released
focal
not-affected
bionic
not-affected
xenial
not-affected
trusty
not-affected
openssl1.0
plucky
dne
oracular
dne
noble
dne
mantic
dne
jammy
dne
focal
dne
bionic
not-affected