![](/assets/img/cve_300x82_sin_bg.png)
CVE-2023-5678 – Excessive time spent in DH check / generation with large Q parameter value
https://notcve.org/view.php?id=CVE-2023-5678
06 Nov 2023 — Issue summary: Generating excessively long X9.42 DH keys or checking excessively long X9.42 DH keys or parameters may be very slow. Impact summary: Applications that use the functions DH_generate_key() to generate an X9.42 DH key may experience long delays. Likewise, applications that use DH_check_pub_key(), DH_check_pub_key_ex() or EVP_PKEY_public_check() to check an X9.42 DH key or X9.42 DH parameters may experience long delays. Where the key or parameters that are being checked have been obtained from an... • http://www.openwall.com/lists/oss-security/2024/03/11/1 • CWE-325: Missing Cryptographic Step CWE-606: Unchecked Input for Loop Condition CWE-754: Improper Check for Unusual or Exceptional Conditions •
![](/assets/img/cve_300x82_sin_bg.png)
CVE-2023-5363 – Incorrect cipher key & IV length processing
https://notcve.org/view.php?id=CVE-2023-5363
24 Oct 2023 — Issue summary: A bug has been identified in the processing of key and initialisation vector (IV) lengths. This can lead to potential truncation or overruns during the initialisation of some symmetric ciphers. Impact summary: A truncation in the IV can result in non-uniqueness, which could result in loss of confidentiality for some cipher modes. When calling EVP_EncryptInit_ex2(), EVP_DecryptInit_ex2() or EVP_CipherInit_ex2() the provided OSSL_PARAM array is processed after the key and IV have been establish... • http://www.openwall.com/lists/oss-security/2023/10/24/1 • CWE-325: Missing Cryptographic Step CWE-684: Incorrect Provision of Specified Functionality •
![](/assets/img/cve_300x82_sin_bg.png)
CVE-2023-4807 – POLY1305 MAC implementation corrupts XMM registers on Windows
https://notcve.org/view.php?id=CVE-2023-4807
08 Sep 2023 — Issue summary: The POLY1305 MAC (message authentication code) implementation contains a bug that might corrupt the internal state of applications on the Windows 64 platform when running on newer X86_64 processors supporting the AVX512-IFMA instructions. Impact summary: If in an application that uses the OpenSSL library an attacker can influence whether the POLY1305 MAC algorithm is used, the application state might be corrupted with various application dependent consequences. The POLY1305 MAC (message authe... • https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=4bfac4471f53c4f74c8d81020beb938f92d84ca5 • CWE-440: Expected Behavior Violation •
![](/assets/img/cve_300x82_sin_bg.png)
CVE-2023-3817 – Excessive time spent checking DH q parameter value
https://notcve.org/view.php?id=CVE-2023-3817
31 Jul 2023 — Issue summary: Checking excessively long DH keys or parameters may be very slow. Impact summary: Applications that use the functions DH_check(), DH_check_ex() or EVP_PKEY_param_check() to check a DH key or DH parameters may experience long delays. Where the key or parameters that are being checked have been obtained from an untrusted source this may lead to a Denial of Service. The function DH_check() performs various checks on DH parameters. After fixing CVE-2023-3446 it was discovered that a large q param... • http://seclists.org/fulldisclosure/2023/Jul/43 • CWE-606: Unchecked Input for Loop Condition CWE-834: Excessive Iteration •
![](/assets/img/cve_300x82_sin_bg.png)
CVE-2023-3446 – Excessive time spent checking DH keys and parameters
https://notcve.org/view.php?id=CVE-2023-3446
19 Jul 2023 — Issue summary: Checking excessively long DH keys or parameters may be very slow. Impact summary: Applications that use the functions DH_check(), DH_check_ex() or EVP_PKEY_param_check() to check a DH key or DH parameters may experience long delays. Where the key or parameters that are being checked have been obtained from an untrusted source this may lead to a Denial of Service. The function DH_check() performs various checks on DH parameters. One of those checks confirms that the modulus ('p' parameter) is ... • http://www.openwall.com/lists/oss-security/2023/07/19/4 • CWE-400: Uncontrolled Resource Consumption CWE-606: Unchecked Input for Loop Condition CWE-1333: Inefficient Regular Expression Complexity •
![](/assets/img/cve_300x82_sin_bg.png)
CVE-2023-2975 – AES-SIV implementation ignores empty associated data entries
https://notcve.org/view.php?id=CVE-2023-2975
14 Jul 2023 — Issue summary: The AES-SIV cipher implementation contains a bug that causes it to ignore empty associated data entries which are unauthenticated as a consequence. Impact summary: Applications that use the AES-SIV algorithm and want to authenticate empty data entries as associated data can be mislead by removing adding or reordering such empty entries as these are ignored by the OpenSSL implementation. We are currently unaware of any such applications. The AES-SIV algorithm allows for authentication of multi... • http://www.openwall.com/lists/oss-security/2023/07/15/1 • CWE-287: Improper Authentication CWE-354: Improper Validation of Integrity Check Value •
![](/assets/img/cve_300x82_sin_bg.png)
CVE-2023-2650 – Possible DoS translating ASN.1 object identifiers
https://notcve.org/view.php?id=CVE-2023-2650
30 May 2023 — Issue summary: Processing some specially crafted ASN.1 object identifiers or data containing them may be very slow. Impact summary: Applications that use OBJ_obj2txt() directly, or use any of the OpenSSL subsystems OCSP, PKCS7/SMIME, CMS, CMP/CRMF or TS with no message size limit may experience notable to very long delays when processing those messages, which may lead to a Denial of Service. An OBJECT IDENTIFIER is composed of a series of numbers - sub-identifiers - most of which have no size limit. OBJ_obj... • https://github.com/hshivhare67/OpenSSL_1.1.1g_CVE-2023-2650 • CWE-400: Uncontrolled Resource Consumption CWE-770: Allocation of Resources Without Limits or Throttling •
![](/assets/img/cve_300x82_sin_bg.png)
CVE-2023-1255 – Input buffer over-read in AES-XTS implementation on 64 bit ARM
https://notcve.org/view.php?id=CVE-2023-1255
20 Apr 2023 — Issue summary: The AES-XTS cipher decryption implementation for 64 bit ARM platform contains a bug that could cause it to read past the input buffer, leading to a crash. Impact summary: Applications that use the AES-XTS algorithm on the 64 bit ARM platform can crash in rare circumstances. The AES-XTS algorithm is usually used for disk encryption. The AES-XTS cipher decryption implementation for 64 bit ARM platform will read past the end of the ciphertext buffer if the ciphertext size is 4 mod 5 in 16 byte b... • https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=02ac9c9420275868472f33b01def01218742b8bb • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer CWE-125: Out-of-bounds Read •
![](/assets/img/cve_300x82_sin_bg.png)
CVE-2023-0465 – Invalid certificate policies in leaf certificates are silently ignored
https://notcve.org/view.php?id=CVE-2023-0465
28 Mar 2023 — Applications that use a non-default option when verifying certificates may be vulnerable to an attack from a malicious CA to circumvent certain checks. Invalid certificate policies in leaf certificates are silently ignored by OpenSSL and other certificate policy checks are skipped for that certificate. A malicious CA could use this to deliberately assert invalid certificate policies in order to circumvent policy checking on the certificate altogether. Policy processing is disabled by default but can be enab... • https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=10325176f3d3e98c6e2b3bf5ab1e3b334de6947a • CWE-295: Improper Certificate Validation •
![](/assets/img/cve_300x82_sin_bg.png)
CVE-2023-0466 – Certificate policy check not enabled
https://notcve.org/view.php?id=CVE-2023-0466
28 Mar 2023 — The function X509_VERIFY_PARAM_add0_policy() is documented to implicitly enable the certificate policy check when doing certificate verification. However the implementation of the function does not enable the check which allows certificates with invalid or incorrect policies to pass the certificate verification. As suddenly enabling the policy check could break existing deployments it was decided to keep the existing behavior of the X509_VERIFY_PARAM_add0_policy() function. Instead the applications that req... • http://www.openwall.com/lists/oss-security/2023/09/28/4 • CWE-295: Improper Certificate Validation •