{"id":"CVE-2018-0732","details":"During key agreement in a TLS handshake using a DH(E) based ciphersuite a malicious server can send a very large prime value to the client. This will cause the client to spend an unreasonably long period of time generating a key for this prime resulting in a hang until the client has finished. This could be exploited in a Denial Of Service attack. Fixed in OpenSSL 1.1.0i-dev (Affected 1.1.0-1.1.0h). Fixed in OpenSSL 1.0.2p-dev (Affected 1.0.2-1.0.2o).","modified":"2026-04-16T01:38:32.181597013Z","published":"2018-06-12T13:29:00.207Z","related":["SUSE-FU-2022:0445-1","SUSE-SU-2018:1887-1","SUSE-SU-2018:1887-2","SUSE-SU-2018:1968-1","SUSE-SU-2018:2036-1","SUSE-SU-2018:2041-1","SUSE-SU-2018:2207-1","SUSE-SU-2018:2534-1","SUSE-SU-2018:2545-1","SUSE-SU-2018:2647-1","SUSE-SU-2018:2683-1","SUSE-SU-2018:2796-1","SUSE-SU-2018:2812-1","SUSE-SU-2018:2956-1","SUSE-SU-2018:2965-1","SUSE-SU-2019:14246-1","SUSE-SU-2019:1553-1","openSUSE-SU-2024:11126-1","openSUSE-SU-2024:11127-1","openSUSE-SU-2024:11501-1"],"references":[{"type":"WEB","url":"https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=3984ef0b72831da8b3ece4745cac4f8575b19098"},{"type":"WEB","url":"https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=ea7abeeabf92b7aca160bdd0208636d4da69f4f4"},{"type":"WEB","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/EWC42UXL5GHTU5G77VKBF6JYUUNGSHOM/"},{"type":"WEB","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/Y3IVFGSERAZLNJCK35TEM2R4726XIH3Z/"},{"type":"WEB","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZBEV5QGDRFUZDMNECFXUSN5FMYOZDE4V/"},{"type":"ADVISORY","url":"http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html"},{"type":"ADVISORY","url":"http://www.securityfocus.com/bid/104442"},{"type":"ADVISORY","url":"http://www.securitytracker.com/id/1041090"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2018:2552"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2018:2553"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2018:3221"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2018:3505"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2019:1296"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2019:1297"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2019:1543"},{"type":"ADVISORY","url":"https://cert-portal.siemens.com/productcert/pdf/ssa-419820.pdf"},{"type":"ADVISORY","url":"https://lists.debian.org/debian-lts-announce/2018/07/msg00043.html"},{"type":"ADVISORY","url":"https://nodejs.org/en/blog/vulnerability/august-2018-security-releases/"},{"type":"ADVISORY","url":"https://security.gentoo.org/glsa/201811-03"},{"type":"ADVISORY","url":"https://security.netapp.com/advisory/ntap-20181105-0001/"},{"type":"ADVISORY","url":"https://security.netapp.com/advisory/ntap-20190118-0002/"},{"type":"ADVISORY","url":"https://securityadvisories.paloaltonetworks.com/Home/Detail/133"},{"type":"ADVISORY","url":"https://usn.ubuntu.com/3692-1/"},{"type":"ADVISORY","url":"https://usn.ubuntu.com/3692-2/"},{"type":"ADVISORY","url":"https://www.debian.org/security/2018/dsa-4348"},{"type":"ADVISORY","url":"https://www.debian.org/security/2018/dsa-4355"},{"type":"ADVISORY","url":"https://www.openssl.org/news/secadv/20180612.txt"},{"type":"ADVISORY","url":"https://www.oracle.com/security-alerts/cpuapr2020.html"},{"type":"ADVISORY","url":"https://www.oracle.com/security-alerts/cpujan2021.html"},{"type":"ADVISORY","url":"https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html"},{"type":"ADVISORY","url":"https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html"},{"type":"ADVISORY","url":"https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html"},{"type":"ADVISORY","url":"https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html"},{"type":"ADVISORY","url":"https://www.tenable.com/security/tns-2018-12"},{"type":"ADVISORY","url":"https://www.tenable.com/security/tns-2018-13"},{"type":"ADVISORY","url":"https://www.tenable.com/security/tns-2018-14"},{"type":"ADVISORY","url":"https://www.tenable.com/security/tns-2018-17"},{"type":"FIX","url":"http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html"},{"type":"FIX","url":"https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html"},{"type":"FIX","url":"https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html"},{"type":"FIX","url":"https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html"},{"type":"FIX","url":"https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/nodejs/node","events":[{"introduced":"0d8021e5a4cf0a6aa3a700a361f6d42c2894f2ba"},{"fixed":"dc6bbb44daec5584a0fbd37f0916baeff3202dba"},{"introduced":"6b1c40be84fbe5ea404f25e4e340a0c1fe67a60a"},{"fixed":"1cb5aed5f596a9cb5b68e3a676222c0c35501a5e"},{"introduced":"ce3e3c5fe15479475c068482c48eb9cbf1ac9df5"},{"fixed":"c6a397bce63fc026421e1515b98eec9b8b5a8468"},{"introduced":"cf41627411886000429bde058a6594fb7f6d6d47"},{"fixed":"03b825811ed4af0addcdf6e75bacb3dc1c4c5940"},{"introduced":"f76ce0a75641991bfc235775a4747c978e0e281b"},{"fixed":"0cae3c3fe5e3f4c275701446a4baf1f2727344f6"}]}],"versions":["v10.0.0","v10.1.0","v10.2.0","v10.2.1","v10.3.0","v10.4.0","v10.4.1","v10.5.0","v10.6.0","v10.7.0","v10.8.0","v6.10.0","v6.10.1","v6.10.2","v6.10.3","v6.11.0","v6.11.1","v6.11.2","v6.11.3","v6.11.4","v6.11.5","v6.12.0","v6.12.1","v6.12.2","v6.12.3","v6.13.0","v6.13.1","v6.14.0","v6.14.1","v6.14.2","v6.14.3","v6.9.0","v6.9.1","v6.9.2","v6.9.3","v6.9.4","v6.9.5","v8.0.0","v8.1.0","v8.1.1","v8.1.2","v8.1.3","v8.1.4","v8.2.0","v8.2.1","v8.3.0","v8.4.0","v8.5.0","v8.6.0","v8.7.0","v8.8.0"],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2018-0732.json"}}],"schema_version":"1.7.3","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}]}