CVE Vulnerabilities

CVE-2018-0739

Uncontrolled Recursion

Published: Mar 27, 2018 | Modified: Nov 21, 2024
CVSS 3.x
6.5
MEDIUM
Source:
NVD
CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
CVSS 2.x
4.3 MEDIUM
AV:N/AC:M/Au:N/C:N/I:N/A:P
RedHat/V2
RedHat/V3
6.5 MODERATE
CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
Ubuntu
MEDIUM
root.io logo minimus.io logo echo.ai logo

Constructed ASN.1 types with a recursive definition (such as can be found in PKCS7) could eventually exceed the stack given malicious input with excessive recursion. This could result in a Denial Of Service attack. There are no such structures used within SSL/TLS that come from untrusted sources so this is considered safe. Fixed in OpenSSL 1.1.0h (Affected 1.1.0-1.1.0g). Fixed in OpenSSL 1.0.2o (Affected 1.0.2b-1.0.2n).

Weakness

The product does not properly control the amount of recursion that takes place, consuming excessive resources, such as allocated memory or the program stack.

Affected Software

NameVendorStart VersionEnd Version
OpensslOpenssl1.0.2b (including)1.0.2n (including)
OpensslOpenssl1.1.0 (including)1.1.0g (including)
JBoss Core Services on RHEL 6RedHatjbcs-httpd24-0:1-6.jbcs.el6*
JBoss Core Services on RHEL 6RedHatjbcs-httpd24-apache-commons-daemon-jsvc-1:1.1.0-3.redhat_2.jbcs.el6*
JBoss Core Services on RHEL 6RedHatjbcs-httpd24-apr-0:1.6.3-31.jbcs.el6*
JBoss Core Services on RHEL 6RedHatjbcs-httpd24-apr-util-0:1.6.1-24.jbcs.el6*
JBoss Core Services on RHEL 6RedHatjbcs-httpd24-httpd-0:2.4.29-35.jbcs.el6*
JBoss Core Services on RHEL 6RedHatjbcs-httpd24-mod_cluster-native-0:1.3.8-3.Final_redhat_2.jbcs.el6*
JBoss Core Services on RHEL 6RedHatjbcs-httpd24-mod_jk-0:1.2.46-1.redhat_1.jbcs.el6*
JBoss Core Services on RHEL 6RedHatjbcs-httpd24-nghttp2-0:1.29.0-9.jbcs.el6*
JBoss Core Services on RHEL 6RedHatjbcs-httpd24-openssl-1:1.0.2n-14.jbcs.el6*
JBoss Core Services on RHEL 7RedHatjbcs-httpd24-0:1-6.jbcs.el7*
JBoss Core Services on RHEL 7RedHatjbcs-httpd24-apache-commons-daemon-jsvc-1:1.1.0-3.redhat_2.jbcs.el7*
JBoss Core Services on RHEL 7RedHatjbcs-httpd24-apr-0:1.6.3-31.jbcs.el7*
JBoss Core Services on RHEL 7RedHatjbcs-httpd24-apr-util-0:1.6.1-24.jbcs.el7*
JBoss Core Services on RHEL 7RedHatjbcs-httpd24-httpd-0:2.4.29-35.jbcs.el7*
JBoss Core Services on RHEL 7RedHatjbcs-httpd24-mod_cluster-native-0:1.3.8-3.Final_redhat_2.jbcs.el7*
JBoss Core Services on RHEL 7RedHatjbcs-httpd24-mod_jk-0:1.2.46-1.redhat_1.jbcs.el7*
JBoss Core Services on RHEL 7RedHatjbcs-httpd24-nghttp2-0:1.29.0-9.jbcs.el7*
JBoss Core Services on RHEL 7RedHatjbcs-httpd24-openssl-1:1.0.2n-14.jbcs.el7*
Red Hat Enterprise Linux 7RedHatovmf-0:20180508-3.gitee3198e672e2.el7*
Red Hat Enterprise Linux 7RedHatopenssl-1:1.0.2k-16.el7*
Red Hat JBoss Web Server 3.1RedHatopenssl*
Red Hat JBoss Web Server 3 for RHEL 6RedHattomcat7-0:7.0.70-34.ep7.el6*
Red Hat JBoss Web Server 3 for RHEL 6RedHattomcat8-0:8.0.36-39.ep7.el6*
Red Hat JBoss Web Server 3 for RHEL 6RedHattomcat-native-0:1.2.17-19.redhat_19.ep7.el6*
Red Hat JBoss Web Server 3 for RHEL 7RedHattomcat7-0:7.0.70-34.ep7.el7*
Red Hat JBoss Web Server 3 for RHEL 7RedHattomcat8-0:8.0.36-39.ep7.el7*
Red Hat JBoss Web Server 3 for RHEL 7RedHattomcat-native-0:1.2.17-19.redhat_19.ep7.el7*
Text-Only JBCSRedHatopenssl*
OpensslUbuntuartful*
OpensslUbuntubionic*
OpensslUbuntucosmic*
OpensslUbuntudevel*
OpensslUbuntudisco*
OpensslUbuntuesm-infra-legacy/trusty*
OpensslUbuntuesm-infra/bionic*
OpensslUbuntuesm-infra/xenial*
OpensslUbuntutrusty*
OpensslUbuntutrusty/esm*
OpensslUbuntuupstream*
OpensslUbuntuxenial*
Openssl098Ubuntutrusty*
Openssl1.0Ubuntubionic*
Openssl1.0Ubuntucosmic*
Openssl1.0Ubuntuesm-infra/bionic*

Potential Mitigations

References