Description
During key agreement in a TLS handshake using a DH(E) based ciphersuite a malicious server can send a very large prime value to the client. This will cause the client to spend an unreasonably long period of time generating a key for this prime resulting in a hang until the client has finished. This could be exploited in a Denial Of Service attack. Fixed in OpenSSL 1.1.0i-dev (Affected 1.1.0-1.1.0h). Fixed in OpenSSL 1.0.2p-dev (Affected 1.0.2-1.0.2o).
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-1449-1 | openssl security update |
Debian DSA |
DSA-4348-1 | openssl security update |
Debian DSA |
DSA-4355-1 | openssl1.0 security update |
Ubuntu USN |
USN-3692-1 | OpenSSL vulnerabilities |
Ubuntu USN |
USN-3692-2 | OpenSSL vulnerabilities |
References
History
Wed, 16 Jul 2025 13:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
epss
|
epss
|
Status: PUBLISHED
Assigner: openssl
Published:
Updated: 2024-09-17T02:11:18.325Z
Reserved: 2017-11-30T00:00:00.000Z
Link: CVE-2018-0732
No data.
Status : Modified
Published: 2018-06-12T13:29:00.207
Modified: 2024-11-21T03:38:49.630
Link: CVE-2018-0732
OpenCVE Enrichment
No data.
Debian DLA
Debian DSA
Ubuntu USN