{"id":"USN-6709-1","summary":"openssl1.0 vulnerabilities","details":"\nIt was discovered that checking excessively long DH keys or parameters\nmay be very slow. A remote attacker could possibly use this issue to\ncause OpenSSL to consume resources, resulting in a denial of service.\n(CVE-2023-3446)\n\nAfter the fix for CVE-2023-3446 Bernd Edlinger discovered that a large\nq parameter value can also trigger an overly long computation during\nsome of these checks. A remote attacker could possibly use this issue\nto cause OpenSSL to consume resources, resulting in a denial of\nservice. (CVE-2023-3817)\n\nDavid Benjamin discovered that generating excessively long X9.42 DH\nkeys or checking excessively long X9.42 DH keys or parameters may be\nvery slow. A remote attacker could possibly use this issue to cause\nOpenSSL to consume resources, resulting in a denial of service.\n(CVE-2023-5678)\n\nBahaa Naamneh discovered that processing a maliciously formatted\nPKCS12 file may lead OpenSSL to crash leading to a potential Denial of\nService attack. (CVE-2024-0727)\n","modified":"2026-02-10T04:43:38Z","published":"2024-03-21T16:53:43Z","related":["UBUNTU-CVE-2023-3446","UBUNTU-CVE-2023-3817","UBUNTU-CVE-2023-5678","UBUNTU-CVE-2024-0727"],"upstream":["CVE-2023-3446","CVE-2023-3817","CVE-2023-5678","CVE-2024-0727","UBUNTU-CVE-2023-3446","UBUNTU-CVE-2023-3817","UBUNTU-CVE-2023-5678","UBUNTU-CVE-2024-0727"],"references":[{"type":"ADVISORY","url":"https://ubuntu.com/security/notices/USN-6709-1"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2023-3446"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2023-3817"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2023-5678"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2024-0727"}],"affected":[{"package":{"name":"openssl1.0","ecosystem":"Ubuntu:Pro:18.04:LTS","purl":"pkg:deb/ubuntu/openssl1.0@1.0.2n-1ubuntu5.13+esm1?arch=source&distro=esm-infra/bionic"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"1.0.2n-1ubuntu5.13+esm1"}]}],"versions":["1.0.2n-1ubuntu2","1.0.2n-1ubuntu3","1.0.2n-1ubuntu4","1.0.2n-1ubuntu5","1.0.2n-1ubuntu5.1","1.0.2n-1ubuntu5.2","1.0.2n-1ubuntu5.3","1.0.2n-1ubuntu5.4","1.0.2n-1ubuntu5.5","1.0.2n-1ubuntu5.6","1.0.2n-1ubuntu5.7","1.0.2n-1ubuntu5.8","1.0.2n-1ubuntu5.9","1.0.2n-1ubuntu5.10","1.0.2n-1ubuntu5.11","1.0.2n-1ubuntu5.12","1.0.2n-1ubuntu5.13"],"ecosystem_specific":{"availability":"Available with Ubuntu Pro (Infra-only): https://ubuntu.com/pro","binaries":[{"binary_version":"1.0.2n-1ubuntu5.13+esm1","binary_name":"libssl1.0-dev"},{"binary_version":"1.0.2n-1ubuntu5.13+esm1","binary_name":"libssl1.0.0"},{"binary_version":"1.0.2n-1ubuntu5.13+esm1","binary_name":"openssl1.0"}]},"database_specific":{"cves_map":{"cves":[{"id":"CVE-2023-3446","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"},{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"},{"type":"Ubuntu","score":"low"}]},{"id":"CVE-2023-3817","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"},{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"},{"type":"Ubuntu","score":"low"}]},{"id":"CVE-2023-5678","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"},{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"},{"type":"Ubuntu","score":"low"}]},{"id":"CVE-2024-0727","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"low"}]}],"ecosystem":"Ubuntu:Pro:18.04:LTS"},"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-6709-1.json"}}],"schema_version":"1.7.3"}