{"id":"USN-6709-1","summary":"openssl1.0 vulnerabilities","details":"\nIt was discovered that checking excessively long DH keys or parameters\nmay be very slow. A remote attacker could possibly use this issue to\ncause OpenSSL to consume resources, resulting in a denial of service.\n(CVE-2023-3446)\n\nAfter the fix for CVE-2023-3446 Bernd Edlinger discovered that a large\nq parameter value can also trigger an overly long computation during\nsome of these checks. A remote attacker could possibly use this issue\nto cause OpenSSL to consume resources, resulting in a denial of\nservice. (CVE-2023-3817)\n\nDavid Benjamin discovered that generating excessively long X9.42 DH\nkeys or checking excessively long X9.42 DH keys or parameters may be\nvery slow. A remote attacker could possibly use this issue to cause\nOpenSSL to consume resources, resulting in a denial of service.\n(CVE-2023-5678)\n\nBahaa Naamneh discovered that processing a maliciously formatted\nPKCS12 file may lead OpenSSL to crash leading to a potential Denial of\nService attack. (CVE-2024-0727)\n","modified":"2026-04-27T16:50:07.120165Z","published":"2024-03-21T16:53:43Z","related":["UBUNTU-CVE-2023-3446","UBUNTU-CVE-2023-3817","UBUNTU-CVE-2023-5678","UBUNTU-CVE-2024-0727"],"upstream":["CVE-2023-3446","CVE-2023-3817","CVE-2023-5678","CVE-2024-0727","UBUNTU-CVE-2023-3446","UBUNTU-CVE-2023-3817","UBUNTU-CVE-2023-5678","UBUNTU-CVE-2024-0727"],"references":[{"type":"ADVISORY","url":"https://ubuntu.com/security/notices/USN-6709-1"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2023-3446"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2023-3817"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2023-5678"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2024-0727"}],"affected":[{"package":{"name":"openssl1.0","ecosystem":"Ubuntu:Pro:18.04:LTS","purl":"pkg:deb/ubuntu/openssl1.0@1.0.2n-1ubuntu5.13+esm1?arch=source&distro=esm-infra/bionic"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"1.0.2n-1ubuntu5.13+esm1"}]}],"versions":["1.0.2n-1ubuntu2","1.0.2n-1ubuntu3","1.0.2n-1ubuntu4","1.0.2n-1ubuntu5","1.0.2n-1ubuntu5.1","1.0.2n-1ubuntu5.2","1.0.2n-1ubuntu5.3","1.0.2n-1ubuntu5.4","1.0.2n-1ubuntu5.5","1.0.2n-1ubuntu5.6","1.0.2n-1ubuntu5.7","1.0.2n-1ubuntu5.8","1.0.2n-1ubuntu5.9","1.0.2n-1ubuntu5.10","1.0.2n-1ubuntu5.11","1.0.2n-1ubuntu5.12","1.0.2n-1ubuntu5.13"],"ecosystem_specific":{"availability":"Available with Ubuntu Pro (Infra-only): https://ubuntu.com/pro","binaries":[{"binary_name":"libssl1.0.0","binary_version":"1.0.2n-1ubuntu5.13+esm1"},{"binary_name":"openssl1.0","binary_version":"1.0.2n-1ubuntu5.13+esm1"}]},"database_specific":{"cves_map":{"cves":[{"id":"CVE-2023-3446","severity":[{"score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L","type":"CVSS_V3"},{"score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L","type":"CVSS_V3"},{"score":"low","type":"Ubuntu"}]},{"id":"CVE-2023-3817","severity":[{"score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L","type":"CVSS_V3"},{"score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L","type":"CVSS_V3"},{"score":"low","type":"Ubuntu"}]},{"id":"CVE-2023-5678","severity":[{"score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L","type":"CVSS_V3"},{"score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L","type":"CVSS_V3"},{"score":"low","type":"Ubuntu"}]},{"id":"CVE-2024-0727","severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"low","type":"Ubuntu"}]}],"ecosystem":"Ubuntu:Pro:18.04:LTS"},"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-6709-1.json"}}],"schema_version":"1.7.5"}