
Cloud Vulnerability DB
An open project to list all known cloud vulnerabilities and Cloud Service Provider security issues
CVE-2024-4603 is a vulnerability in OpenSSL versions 3.3, 3.2, 3.1, and 3.0, discovered on February 13th, 2024, by OSSfuzz and disclosed on May 16th, 2024. The vulnerability affects applications that use the functions EVPPKEYparamcheck() or EVPPKEYpubliccheck() to check DSA public keys or parameters. OpenSSL has classified this as a low-severity vulnerability (OpenSSL Advisory).
The vulnerability occurs when checking DSA parameters where the modulus ('p' parameter) is too large. While OpenSSL normally prevents using public keys with modulus larger than 10,000 bits for signature verification, the key and parameter check functions did not implement this size limitation. This oversight can lead to excessive computation time during validation checks (OpenSSL Advisory).
When exploited, this vulnerability can cause significant delays in applications that perform DSA key or parameter validation, potentially leading to a Denial of Service (DoS) condition. The impact is particularly relevant when the key or parameters being checked are obtained from untrusted sources. The OpenSSL SSL/TLS implementation itself is not affected, though the OpenSSL 3.0 and 3.1 FIPS providers are impacted (OpenSSL Advisory).
To resolve this issue, OpenSSL implemented a fix that causes DSA keys larger than OPENSSLDSAMAXMODULUSBITS to fail the check immediately with a DSARMODULUSTOOLARGE error. The fix is available in commits 53ea0648 (for 3.3), da343d06 (for 3.2), 9c39b385 (for 3.1), and 3559e868 (for 3.0) in the OpenSSL git repository. Due to the low severity, no immediate new releases were issued, with the fix scheduled for inclusion in future releases (OpenSSL Advisory).
Various organizations have responded to this vulnerability. Microsoft acknowledged the issue affecting several applications including OneDrive, and announced that OneDrive Sync App 25.004.0109.0002 would include OpenSSL 3.4.0.0 to address the vulnerability (Microsoft Q&A).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
An open project to list all known cloud vulnerabilities and Cloud Service Provider security issues
A comprehensive threat intelligence database of cloud security incidents, actors, tools and techniques
A step-by-step framework for modeling and improving SaaS and PaaS tenant isolation
Get a personalized demo
“Best User Experience I have ever seen, provides full visibility to cloud workloads.”
“Wiz provides a single pane of glass to see what is going on in our cloud environments.”
“We know that if Wiz identifies something as critical, it actually is.”