[3.7] openssl: Client DoS due to large DH parameter (CVE-2018-0732)
During key agreement in a TLS handshake using a DH (E) based ciphersuite
a malicious server can send a very large prime value to the client.
This will cause the client to spend an unreasonably long period of time
generating a key for this prime resulting in a hang until the
client has finished. This could be exploited in a Denial Of Service
attack.
Affected versions:
openssl 1.1.0-1.1.0h, 1.0.2-1.0.2o
References:
https://www.openssl.org/news/secadv/20180612.txt
Patches:
https://github.com/openssl/openssl/commit/ea7abeeabf92b7aca160bdd0208636d4da69f4f4
https://github.com/openssl/openssl/commit/3984ef0b72831da8b3ece4745cac4f8575b19098
(from redmine: issue id 9009, created on 2018-06-14, closed on 2018-07-19)
- Relations:
- copied_to #9007 (closed)
- parent #9007 (closed)
- Changesets:
- Revision f2314286 by Timo Teräs on 2018-07-18T07:25:07Z:
main/openssl: fix CVE-2018-0732 and CVE-2018-0737
fixes #8814
fixes #9009
- Revision 8318a0b0 by Timo Teräs on 2018-11-22T15:32:44Z:
main/openssl: fix CVE-2018-0732 and CVE-2018-0737
fixes #8814
fixes #9009