openssl: Client DoS due to large DH parameter (CVE-2018-0732)
During key agreement in a TLS handshake using a DH (E) based ciphersuite
a malicious server can send a very large prime value to the client.
This will cause the client to spend an unreasonably long period of time
generating a key for this prime resulting in a hang until the
client has finished. This could be exploited in a Denial Of Service
attack.
Affected versions:
openssl 1.1.0-1.1.0h, 1.0.2-1.0.2o
References:
https://www.openssl.org/news/secadv/20180612.txt
Patches:
https://github.com/openssl/openssl/commit/ea7abeeabf92b7aca160bdd0208636d4da69f4f4
https://github.com/openssl/openssl/commit/3984ef0b72831da8b3ece4745cac4f8575b19098
(from redmine: issue id 9007, created on 2018-06-14, closed on 2018-07-19)
- Relations:
- copied_to #9008 (closed)
- copied_to #9009 (closed)
- copied_to #9010 (closed)
- copied_to #9011 (closed)
- child #9008 (closed)
- child #9009 (closed)
- child #9010 (closed)
- child #9011 (closed)