CVE-2018-0732

During key agreement in a TLS handshake using a DH(E) based ciphersuite a malicious server can send a very large prime value to the client. This will cause the client to spend an unreasonably long period of time generating a key for this prime resulting in a hang until the client has finished. This could be exploited in a Denial Of Service attack. Fixed in OpenSSL 1.1.0i-dev (Affected 1.1.0-1.1.0h). Fixed in OpenSSL 1.0.2p-dev (Affected 1.0.2-1.0.2o).

Published at
2018-06-12T13:29Z
2154 days ago
Modified
2022-08-16T13:00Z
628 days ago
CWE-320
Problem type

Impact

CVSS v3 vector string
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

Attack Vector

Attack Complexity

Privileges Required

User Interaction

Scope

Confidentiality

Integrity

Availability

Severity Score Vector

7.5CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

References


URLType
www.openssl.org
https://www.openssl.org/news/secadv/20180612.txt
CONFIRM
git.openssl.org
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=ea7abeeabf92b7aca160bdd0208636d4da69f4f4
CONFIRM
git.openssl.org
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=3984ef0b72831da8b3ece4745cac4f8575b19098
CONFIRM
1041090
http://www.securitytracker.com/id/1041090
SECTRACK
104442
http://www.securityfocus.com/bid/104442
BID
USN-3692-2
https://usn.ubuntu.com/3692-2/
UBUNTU
USN-3692-1
https://usn.ubuntu.com/3692-1/
UBUNTU
[debian-lts-announce] 20180728 [SECURITY] [DLA 1449-1] openssl security update
https://lists.debian.org/debian-lts-announce/2018/07/msg00043.html
MLIST
RHSA-2018:2553
https://access.redhat.com/errata/RHSA-2018:2553
REDHAT
RHSA-2018:2552
https://access.redhat.com/errata/RHSA-2018:2552
REDHAT
nodejs.org
https://nodejs.org/en/blog/vulnerability/august-2018-security-releases/
CONFIRM
www.tenable.com
https://www.tenable.com/security/tns-2018-12
CONFIRM
securityadvisories.paloaltonetworks.com
https://securityadvisories.paloaltonetworks.com/Home/Detail/133
CONFIRM
www.oracle.com
http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html
CONFIRM
www.tenable.com
https://www.tenable.com/security/tns-2018-14
CONFIRM
www.tenable.com
https://www.tenable.com/security/tns-2018-13
CONFIRM
RHSA-2018:3221
https://access.redhat.com/errata/RHSA-2018:3221
REDHAT
security.netapp.com
https://security.netapp.com/advisory/ntap-20181105-0001/
CONFIRM
RHSA-2018:3505
https://access.redhat.com/errata/RHSA-2018:3505
REDHAT
GLSA-201811-03
https://security.gentoo.org/glsa/201811-03
GENTOO
DSA-4348
https://www.debian.org/security/2018/dsa-4348
DEBIAN
DSA-4355
https://www.debian.org/security/2018/dsa-4355
DEBIAN
www.tenable.com
https://www.tenable.com/security/tns-2018-17
CONFIRM
www.oracle.com
https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html
CONFIRM
security.netapp.com
https://security.netapp.com/advisory/ntap-20190118-0002/
CONFIRM
www.oracle.com
https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html
MISC
RHSA-2019:1297
https://access.redhat.com/errata/RHSA-2019:1297
REDHAT
RHSA-2019:1296
https://access.redhat.com/errata/RHSA-2019:1296
REDHAT
RHSA-2019:1543
https://access.redhat.com/errata/RHSA-2019:1543
REDHAT
www.oracle.com
https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html
MISC
FEDORA-2019-db06efdea1
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EWC42UXL5GHTU5G77VKBF6JYUUNGSHOM/
FEDORA
FEDORA-2019-00c25b9379
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZBEV5QGDRFUZDMNECFXUSN5FMYOZDE4V/
FEDORA
FEDORA-2019-9a0a7c0986
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Y3IVFGSERAZLNJCK35TEM2R4726XIH3Z/
FEDORA
www.oracle.com
https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html
MISC
N/A
https://www.oracle.com/security-alerts/cpuapr2020.html
N/A
www.oracle.com
https://www.oracle.com/security-alerts/cpujan2021.html
MISC
cert-portal.siemens.com
https://cert-portal.siemens.com/productcert/pdf/ssa-419820.pdf
CONFIRM

GET https://vulnerabilitydata.com/api/details/CVE-2018-0732

{
	"id": "CVE-2018-0732",
	"published_date": "2018-06-12T13:29Z",
	"last_modified_date": "2022-08-16T13:00Z",
	"assigner": "openssl-security@openssl.org",
	"description": "During key agreement in a TLS handshake using a DH(E) based ciphersuite a malicious server can send a very large prime value to the client. This will cause the client to spend an unreasonably long period of time generating a key for this prime resulting in a hang until the client has finished. This could be exploited in a Denial Of Service attack. Fixed in OpenSSL 1.1.0i-dev (Affected 1.1.0-1.1.0h). Fixed in OpenSSL 1.0.2p-dev (Affected 1.0.2-1.0.2o).",
	"references": [
		{
			"url": "https://www.openssl.org/news/secadv/20180612.txt",
			"name": "https://www.openssl.org/news/secadv/20180612.txt",
			"refsource": "CONFIRM",
			"tags": [
				"Vendor Advisory"
			]
		},
		{
			"url": "https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=ea7abeeabf92b7aca160bdd0208636d4da69f4f4",
			"name": "https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=ea7abeeabf92b7aca160bdd0208636d4da69f4f4",
			"refsource": "CONFIRM",
			"tags": [
				"Patch",
				"Third Party Advisory"
			]
		},
		{
			"url": "https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=3984ef0b72831da8b3ece4745cac4f8575b19098",
			"name": "https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=3984ef0b72831da8b3ece4745cac4f8575b19098",
			"refsource": "CONFIRM",
			"tags": [
				"Patch",
				"Third Party Advisory"
			]
		},
		{
			"url": "http://www.securitytracker.com/id/1041090",
			"name": "1041090",
			"refsource": "SECTRACK",
			"tags": [
				"Third Party Advisory",
				"VDB Entry"
			]
		},
		{
			"url": "http://www.securityfocus.com/bid/104442",
			"name": "104442",
			"refsource": "BID",
			"tags": [
				"Third Party Advisory",
				"VDB Entry"
			]
		},
		{
			"url": "https://usn.ubuntu.com/3692-2/",
			"name": "USN-3692-2",
			"refsource": "UBUNTU",
			"tags": [
				"Third Party Advisory"
			]
		},
		{
			"url": "https://usn.ubuntu.com/3692-1/",
			"name": "USN-3692-1",
			"refsource": "UBUNTU",
			"tags": [
				"Third Party Advisory"
			]
		},
		{
			"url": "https://lists.debian.org/debian-lts-announce/2018/07/msg00043.html",
			"name": "[debian-lts-announce] 20180728 [SECURITY] [DLA 1449-1] openssl security update",
			"refsource": "MLIST",
			"tags": [
				"Third Party Advisory"
			]
		},
		{
			"url": "https://access.redhat.com/errata/RHSA-2018:2553",
			"name": "RHSA-2018:2553",
			"refsource": "REDHAT",
			"tags": [
				"Third Party Advisory"
			]
		},
		{
			"url": "https://access.redhat.com/errata/RHSA-2018:2552",
			"name": "RHSA-2018:2552",
			"refsource": "REDHAT",
			"tags": [
				"Third Party Advisory"
			]
		},
		{
			"url": "https://nodejs.org/en/blog/vulnerability/august-2018-security-releases/",
			"name": "https://nodejs.org/en/blog/vulnerability/august-2018-security-releases/",
			"refsource": "CONFIRM",
			"tags": [
				"Vendor Advisory"
			]
		},
		{
			"url": "https://www.tenable.com/security/tns-2018-12",
			"name": "https://www.tenable.com/security/tns-2018-12",
			"refsource": "CONFIRM",
			"tags": [
				"Third Party Advisory"
			]
		},
		{
			"url": "https://securityadvisories.paloaltonetworks.com/Home/Detail/133",
			"name": "https://securityadvisories.paloaltonetworks.com/Home/Detail/133",
			"refsource": "CONFIRM",
			"tags": [
				"Third Party Advisory"
			]
		},
		{
			"url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html",
			"name": "http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html",
			"refsource": "CONFIRM",
			"tags": [
				"Patch",
				"Third Party Advisory"
			]
		},
		{
			"url": "https://www.tenable.com/security/tns-2018-14",
			"name": "https://www.tenable.com/security/tns-2018-14",
			"refsource": "CONFIRM",
			"tags": [
				"Third Party Advisory"
			]
		},
		{
			"url": "https://www.tenable.com/security/tns-2018-13",
			"name": "https://www.tenable.com/security/tns-2018-13",
			"refsource": "CONFIRM",
			"tags": [
				"Third Party Advisory"
			]
		},
		{
			"url": "https://access.redhat.com/errata/RHSA-2018:3221",
			"name": "RHSA-2018:3221",
			"refsource": "REDHAT",
			"tags": [
				"Third Party Advisory"
			]
		},
		{
			"url": "https://security.netapp.com/advisory/ntap-20181105-0001/",
			"name": "https://security.netapp.com/advisory/ntap-20181105-0001/",
			"refsource": "CONFIRM",
			"tags": [
				"Third Party Advisory"
			]
		},
		{
			"url": "https://access.redhat.com/errata/RHSA-2018:3505",
			"name": "RHSA-2018:3505",
			"refsource": "REDHAT",
			"tags": [
				"Third Party Advisory"
			]
		},
		{
			"url": "https://security.gentoo.org/glsa/201811-03",
			"name": "GLSA-201811-03",
			"refsource": "GENTOO",
			"tags": [
				"Third Party Advisory"
			]
		},
		{
			"url": "https://www.debian.org/security/2018/dsa-4348",
			"name": "DSA-4348",
			"refsource": "DEBIAN",
			"tags": [
				"Third Party Advisory"
			]
		},
		{
			"url": "https://www.debian.org/security/2018/dsa-4355",
			"name": "DSA-4355",
			"refsource": "DEBIAN",
			"tags": [
				"Third Party Advisory"
			]
		},
		{
			"url": "https://www.tenable.com/security/tns-2018-17",
			"name": "https://www.tenable.com/security/tns-2018-17",
			"refsource": "CONFIRM",
			"tags": [
				"Third Party Advisory"
			]
		},
		{
			"url": "https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html",
			"name": "https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html",
			"refsource": "CONFIRM",
			"tags": [
				"Patch",
				"Third Party Advisory"
			]
		},
		{
			"url": "https://security.netapp.com/advisory/ntap-20190118-0002/",
			"name": "https://security.netapp.com/advisory/ntap-20190118-0002/",
			"refsource": "CONFIRM",
			"tags": [
				"Third Party Advisory"
			]
		},
		{
			"url": "https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html",
			"name": "https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html",
			"refsource": "MISC",
			"tags": [
				"Patch",
				"Third Party Advisory"
			]
		},
		{
			"url": "https://access.redhat.com/errata/RHSA-2019:1297",
			"name": "RHSA-2019:1297",
			"refsource": "REDHAT",
			"tags": [
				"Third Party Advisory"
			]
		},
		{
			"url": "https://access.redhat.com/errata/RHSA-2019:1296",
			"name": "RHSA-2019:1296",
			"refsource": "REDHAT",
			"tags": [
				"Third Party Advisory"
			]
		},
		{
			"url": "https://access.redhat.com/errata/RHSA-2019:1543",
			"name": "RHSA-2019:1543",
			"refsource": "REDHAT",
			"tags": [
				"Third Party Advisory"
			]
		},
		{
			"url": "https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html",
			"name": "https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html",
			"refsource": "MISC",
			"tags": [
				"Patch",
				"Third Party Advisory"
			]
		},
		{
			"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EWC42UXL5GHTU5G77VKBF6JYUUNGSHOM/",
			"name": "FEDORA-2019-db06efdea1",
			"refsource": "FEDORA",
			"tags": [
				"Mailing List",
				"Third Party Advisory"
			]
		},
		{
			"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZBEV5QGDRFUZDMNECFXUSN5FMYOZDE4V/",
			"name": "FEDORA-2019-00c25b9379",
			"refsource": "FEDORA",
			"tags": [
				"Mailing List",
				"Third Party Advisory"
			]
		},
		{
			"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Y3IVFGSERAZLNJCK35TEM2R4726XIH3Z/",
			"name": "FEDORA-2019-9a0a7c0986",
			"refsource": "FEDORA",
			"tags": [
				"Third Party Advisory"
			]
		},
		{
			"url": "https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html",
			"name": "https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html",
			"refsource": "MISC",
			"tags": [
				"Patch",
				"Third Party Advisory"
			]
		},
		{
			"url": "https://www.oracle.com/security-alerts/cpuapr2020.html",
			"name": "N/A",
			"refsource": "N/A",
			"tags": [
				"Third Party Advisory"
			]
		},
		{
			"url": "https://www.oracle.com/security-alerts/cpujan2021.html",
			"name": "https://www.oracle.com/security-alerts/cpujan2021.html",
			"refsource": "MISC",
			"tags": [
				"Third Party Advisory"
			]
		},
		{
			"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-419820.pdf",
			"name": "https://cert-portal.siemens.com/productcert/pdf/ssa-419820.pdf",
			"refsource": "CONFIRM",
			"tags": [
				"Third Party Advisory"
			]
		}
	],
	"impact": {
		"baseMetricV3": {
			"cvssV3": {
				"version": "3.1",
				"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
				"attackVector": "NETWORK",
				"attackComplexity": "LOW",
				"privilegesRequired": "NONE",
				"userInteraction": "NONE",
				"scope": "UNCHANGED",
				"confidentialityImpact": "NONE",
				"integrityImpact": "NONE",
				"availabilityImpact": "HIGH",
				"baseScore": 7.5,
				"baseSeverity": "HIGH"
			},
			"exploitabilityScore": 3.9,
			"impactScore": 3.6
		},
		"baseMetricV2": {
			"cvssV2": {
				"version": "2.0",
				"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
				"accessVector": "NETWORK",
				"accessComplexity": "LOW",
				"authentication": "NONE",
				"confidentialityImpact": "NONE",
				"integrityImpact": "NONE",
				"availabilityImpact": "PARTIAL",
				"baseScore": 5
			},
			"severity": "MEDIUM",
			"exploitabilityScore": 10,
			"impactScore": 2.9,
			"obtainAllPrivilege": false,
			"obtainUserPrivilege": false,
			"obtainOtherPrivilege": false,
			"userInteractionRequired": false
		}
	},
	"problem_type": "CWE-320"
}