Description
The DH_check_pub_key function in crypto/dh/dh_check.c in OpenSSL 1.0.2 before 1.0.2f does not ensure that prime numbers are appropriate for Diffie-Hellman (DH) key exchange, which makes it easier for remote attackers to discover a private DH exponent by making multiple handshakes with a peer that chose an inappropriate number, as demonstrated by a number in an X9.42 file.
Remediation
References
Related Vulnerabilities
Jboss EAP Allocation of Resources Without Limits or Throttling Vulnerability (CVE-2019-9515)
Apache HTTP Server NULL Pointer Dereference Vulnerability (CVE-2024-38477)
WordPress Plugin Quick Cache (Speed Without Compromise) Unspecified Vulnerability (140725)
WordPress Plugin Limit Login Attempts Reloaded Security Bypass (2.17.3)
Moodle Permissions, Privileges, and Access Controls Vulnerability (CVE-2011-4293)