CVE-2018-0732

Scores

EPSS

0.784medium78.4%
0%20%40%60%80%100%

Percentile: 78.4%

CVSS

4.3medium3.x
0246810

CVSS Score: 4.3/10

All CVSS Scores

CVSS 3.x
4.3

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L

CVSS 2.0
5.0

Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P

Description

During key agreement in a TLS handshake using a DH(E) based ciphersuite a malicious server can send a very large prime value to the client. This will cause the client to spend an unreasonably long period of time generating a key for this prime resulting in a hang until the client has finished. This could be exploited in a Denial Of Service attack. Fixed in OpenSSL 1.1.0i-dev (Affected 1.1.0-1.1.0h). Fixed in OpenSSL 1.0.2p-dev (Affected 1.0.2-1.0.2o).

Scaner-VS 7 — a modern vulnerability management solution

Uses this database for vulnerability detection. High-speed search, cross-platform, advanced configuration audit, and flexible filtering. Suitable for organizations of any size.
Learn more about Scaner-VS 7

Sources

astradebiannvdredhatubuntu

CWEs

CWE-320CWE-325

Related Vulnerabilities

Recommendations

Source: nvd

All OpenSSL users should upgrade to the latest version:
# emerge –sync
# emerge –ask –oneshot –verbose “>=dev-libs/openssl-1.0.2o-r6”

URL: https://security.gentoo.org/glsa/201811-03

Source: nvd

The References section of this erratum contains a download link (you must log in to download the update). Before applying the update, back up your existing Red Hat JBoss Core Services installation (including all applications and configuration files).

URL: https://access.redhat.com/errata/RHSA-2019:1543

Source: nvd

For details on how to apply this update, which includes the changes described in this advisory, refer to:
https://access.redhat.com/articles/11258
After installing the updated packages, the httpd daemon will be restarted automatically.

URL: https://access.redhat.com/errata/RHSA-2019:1297

Source: nvd

The References section of this erratum contains a download link (you must log in to download the update). Before applying the update, back up your existing Red Hat JBoss Core Services installation (including all applications and configuration files).

URL: https://access.redhat.com/errata/RHSA-2019:1296

Source: nvd

Before applying this update, make sure all previously released erratarelevant to your system have been applied.
For details on how to apply this update, refer to:
https://access.redhat.com/articles/11258

URL: https://access.redhat.com/errata/RHSA-2018:2553

Source: nvd

Before applying this update, make sure all previously released erratarelevant to your system have been applied.
For details on how to apply this update, refer to:
https://access.redhat.com/articles/11258

URL: https://access.redhat.com/errata/RHSA-2018:2552

Vulnerable Software (32)

Type: Configuration

Product: jbcs-httpd24-httpd

Operating System: rhel

Trait:
{  "fixed": "2.4.29-40.jbcs.el6"}

Source: redhat

Type: Configuration

Product: jbcs-httpd24-httpd

Operating System: rhel

Trait:
{  "fixed": "2.4.29-40.jbcs.el7"}

Source: redhat

Type: Configuration

Product: jbcs-httpd24-openssl

Operating System: rhel

Trait:
{  "fixed": "1.0.2n-15.jbcs.el6"}

Source: redhat

Type: Configuration

Product: jbcs-httpd24-openssl

Operating System: rhel

Trait:
{  "fixed": "1.0.2n-15.jbcs.el7"}

Source: redhat

Type: Configuration

Product: libcrypto10

Operating System: altlinux

Trait:
{  "fixed": "0:1.0.2p-alt1"}

Source: redhat

Type: Configuration

Product: libssl-devel

Operating System: altlinux

Trait:
{  "fixed": "0:1.0.2p-alt1"}

Source: redhat

Type: Configuration

Product: libssl-devel-static

Operating System: altlinux

Trait:
{  "fixed": "0:1.0.2p-alt1"}

Source: redhat

Type: Configuration

Product: libssl10

Operating System: altlinux

Trait:
{  "fixed": "0:1.0.2p-alt1"}

Source: redhat

Type: Configuration

Product: openssl

Operating System: altlinux

Trait:
{  "fixed": "0:1.0.2p-alt1"}

Source: redhat

Type: Configuration

Product: openssl

Operating System: rhel 7

Trait:
{  "fixed": "1.0.2k-16.el7"}

Source: redhat

Type: Configuration

Product: openssl

Operating System: astra 1.6.3

Trait:
{  "unaffected": true}

Source: astra

Type: Configuration

Product: openssl

Operating System: debian

Trait:
{  "fixed": "1.1.1-1"}

Source: debian

Type: Configuration

Product: openssl

Operating System: ubuntu artful 17.10

Trait:
{  "fixed": "1.0.2g-1ubuntu13.6"}

Source: ubuntu

Type: Configuration

Product: openssl

Operating System: ubuntu bionic 18.04

Trait:
{  "fixed": "1.1.0g-2ubuntu4.1"}

Source: ubuntu

Type: Configuration

Product: openssl

Operating System: ubuntu cosmic 18.10

Trait:
{  "fixed": "1.1.0g-2ubuntu5"}

Source: ubuntu

Type: Configuration

Product: openssl

Operating System: ubuntu disco 19.04

Trait:
{  "fixed": "1.1.0g-2ubuntu5"}

Source: ubuntu

Type: Configuration

Product: openssl

Operating System: ubuntu trusty 14.04

Trait:
{  "fixed": "1.0.1f-1ubuntu2.26"}

Source: ubuntu

Type: Configuration

Product: openssl

Operating System: ubuntu xenial 16.04

Trait:
{  "fixed": "1.0.2g-1ubuntu4.13"}

Source: ubuntu

Type: Configuration

Product: openssl-doc

Operating System: altlinux

Trait:
{  "fixed": "0:1.0.2p-alt1"}

Source: redhat

Type: Configuration

Product: openssl-engines

Operating System: altlinux

Trait:
{  "fixed": "0:1.0.2p-alt1"}

Source: redhat