CVE-2024-4603

Issue summary: Checking excessively long DSA keys or parameters may be very
slow.

Impact summary: Applications that use the functions EVP_PKEY_param_check()
or EVP_PKEY_public_check() to check a DSA public key or DSA parameters may
experience long delays. Where the key or parameters that are being checked
have been obtained from an untrusted source this may lead to a Denial of
Service.

The functions EVP_PKEY_param_check() or EVP_PKEY_public_check() perform
various checks on DSA parameters. Some of those computations take a long time
if the modulus (`p` parameter) is too large.

Trying to use a very large modulus is slow and OpenSSL will not allow using
public keys with a modulus which is over 10,000 bits in length for signature
verification. However the key and parameter check functions do not limit
the modulus size when performing the checks.

An application that calls EVP_PKEY_param_check() or EVP_PKEY_public_check()
and supplies a key or parameters obtained from an untrusted source could be
vulnerable to a Denial of Service attack.

These functions are not called by OpenSSL itself on untrusted DSA keys so
only applications that directly call these functions may be vulnerable.

Also vulnerable are the OpenSSL pkey and pkeyparam command line applications
when using the `-check` option.

The OpenSSL SSL/TLS implementation is not affected by this issue.

The OpenSSL 3.0 and 3.1 FIPS providers are affected by this issue.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTPrimary
5.3 MEDIUM
NETWORK
LOW
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
CISA-ADPADP
5.3 MEDIUM
NETWORK
LOW
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
Base Score
CVSS 3.x
EPSS Score
Percentile: 24%
Affected Products (NVD)
VendorProductVersion
opensslopenssl
3.0.14 <
𝑥
< 3.0.14
opensslopenssl
3.1.6 <
𝑥
< 3.1.6
opensslopenssl
3.2.2 <
𝑥
< 3.2.2
opensslopenssl
3.3.1 <
𝑥
< 3.3.1
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
openssl
bookworm
3.0.17-1~deb12u2
fixed
bookworm (security)
3.0.17-1~deb12u3
fixed
bullseye
1.1.1w-0+deb11u1
not-affected
bullseye (security)
1.1.1w-0+deb11u4
fixed
buster
not-affected
forky
3.5.4-1
fixed
sid
3.5.4-1
fixed
trixie
3.5.4-1~deb13u1
fixed
trixie (security)
3.5.1-1+deb13u1
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
nodejs
bionic
needs-triage
focal
not-affected
jammy
needed
mantic
not-affected
noble
not-affected
oracular
not-affected
plucky
not-affected
questing
not-affected
trusty
not-affected
xenial
needs-triage
openssl
bionic
not-affected
focal
not-affected
jammy
Fixed 3.0.2-0ubuntu1.17
released
mantic
ignored
noble
Fixed 3.0.13-0ubuntu3.2
released
oracular
Fixed 3.2.2-1ubuntu1
released
plucky
Fixed 3.2.2-1ubuntu1
released
questing
Fixed 3.2.2-1ubuntu1
released
trusty
not-affected
xenial
not-affected
openssl1.0
bionic
not-affected
focal
dne
jammy
dne
mantic
dne
noble
dne
oracular
dne
plucky
dne
questing
dne
edk2
bionic
not-affected
focal
not-affected
jammy
not-affected
mantic
not-affected
noble
not-affected
oracular
ignored
plucky
not-affected
questing
not-affected
xenial
not-affected