Description
Matrix SSL 4.x through 4.6.0 and Rambus TLS Toolkit have a length-subtraction integer overflow for Client Hello Pre-Shared Key extension parsing in the TLS 1.3 server. An attacked device calculates an SHA-2 hash over at least 65 KB (in RAM). With a large number of crafted TLS messages, the CPU becomes heavily loaded. This occurs in tls13VerifyBinder and tls13TranscriptHashUpdate.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
No advisories yet.
References
History
No history.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-02T11:03:18.963Z
Reserved: 2023-01-30T00:00:00.000Z
Link: CVE-2023-24609
No data.
Status : Modified
Published: 2023-12-22T04:15:08.673
Modified: 2024-11-21T07:48:13.983
Link: CVE-2023-24609
No data.
OpenCVE Enrichment
No data.
Weaknesses