First published: Tue Jun 12 2018(Updated: )
During key agreement in a TLS handshake using a DH(E) based ciphersuite a malicious server can send a very large prime value to the client. This will cause the client to spend an unreasonably long period of time generating a key for this prime resulting in a hang until the client has finished. This could be exploited in a Denial Of Service attack. Fixed in OpenSSL 1.1.0i-dev (Affected 1.1.0-1.1.0h). Fixed in OpenSSL 1.0.2p-dev (Affected 1.0.2-1.0.2o).
Credit: openssl-security@openssl.org openssl-security@openssl.org
Affected Software | Affected Version | How to fix |
---|---|---|
OpenSSL OpenSSL | >=1.0.2<=1.0.2o | |
OpenSSL OpenSSL | >=1.1.0<=1.1.0h | |
Canonical Ubuntu Linux | =12.04 | |
Canonical Ubuntu Linux | =14.04 | |
Canonical Ubuntu Linux | =16.04 | |
Canonical Ubuntu Linux | =17.10 | |
Canonical Ubuntu Linux | =18.04 | |
Debian Debian Linux | =8.0 | |
Nodejs Node.js | >=6.0.0<6.8.1 | |
Nodejs Node.js | >=6.9.0<6.14.4 | |
Nodejs Node.js | >=8.0.0<8.8.1 | |
Nodejs Node.js | >=8.9.0<8.11.4 | |
Nodejs Node.js | >=10.0.0<10.9.0 | |
redhat/openssl | <1.1.0 | 1.1.0 |
redhat/openssl | <1.0.2 | 1.0.2 |
IBM Security Verify Governance | <=10.0 | |
debian/openssl | 1.1.1w-0+deb11u1 1.1.1w-0+deb11u2 3.0.15-1~deb12u1 3.0.14-1~deb12u2 3.3.2-2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2018-0732.
The severity of CVE-2018-0732 is high with a severity value of 7.5.
The affected software includes OpenSSL versions 1.0.2 and 1.1.0, as well as various Ubuntu Linux and Debian versions.
During a TLS handshake using a DH(E) based ciphersuite, a malicious server can send a very large prime value to the client, causing the client to spend an unreasonably long time generating a key for this prime and resulting in a hang.
Yes, there are available remedies provided by Red Hat, Canonical, Ubuntu, and Debian. Please refer to the respective sources for the specific versions and updates.