Excessive delays in checking DSA keys or parameters may lead to Denial of Service attacks
CVE-2024-4603
Summary
The vulnerability arises from the handling of excessively long DSA keys or parameters, which can significantly slow down applications utilizing OpenSSL. When employing the EVP_PKEY_param_check() and EVP_PKEY_public_check() functions to validate DSA public keys or DSA parameters obtained from untrusted sources, applications may become susceptible to Denial of Service (DoS) attacks due to prolonged processing times. These functions internally perform checks on DSA parameters without imposing limits on modulus sizes, potentially leading to delays when excessively large moduli are involved. Notably, while OpenSSL itself does not call these functions on untrusted DSA keys, any application directly invoking them may expose itself to this risk. The affected versions include OpenSSL 3.0 and 3.1, particularly in environments where FIPS providers are implemented.
Affected Version(s)
OpenSSL 3.0.0 < 3.0.14
OpenSSL 3.1.0 < 3.1.6
OpenSSL 3.2.0 < 3.2.2
References
Timeline
Vulnerability published
Vulnerability Reserved