Denial of Service (DoS) Affecting cryptography package, versions [,42.0.0)
Threat Intelligence
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications- Snyk ID SNYK-PYTHON-CRYPTOGRAPHY-6050294
- published 8 Nov 2023
- disclosed 24 Oct 2023
- credit David Benjamin
Introduced: 24 Oct 2023
CVE-2023-5678 Open this link in a new tabHow to fix?
Upgrade cryptography
to version 42.0.0 or higher.
Overview
Affected versions of this package are vulnerable to Denial of Service (DoS) when the DH_generate_key()
, DH_check_pub_key()
, DH_check_pub_key_ex()
, EVP_PKEY_public_check()
, and EVP_PKEY_generate()
functions are used. An attacker can cause long delays and potentially a Denial of Service by supplying excessively long X9.42 DH keys or parameters obtained from an untrusted source.
Note:
This is only exploitable if the application uses these functions to generate or check an X9.42 DH key or parameters. Also, the OpenSSL pkey
command line application, when using the -pubcheck
option, as well as the OpenSSL genpkey
command line application, are vulnerable to this issue.