CVE Vulnerabilities

CVE-2024-27354

Uncontrolled Resource Consumption

Published: Mar 01, 2024 | Modified: Sep 15, 2025
CVSS 3.x
N/A
Source:
NVD
CVSS 2.x
RedHat/V2
RedHat/V3
Ubuntu
MEDIUM
root.io logo minimus.io logo echo.ai logo

An issue was discovered in phpseclib 1.x before 1.0.23, 2.x before 2.0.47, and 3.x before 3.0.36. An attacker can construct a malformed certificate containing an extremely large prime to cause a denial of service (CPU consumption for an isPrime primality check). NOTE: this issue was introduced when attempting to fix CVE-2023-27560.

Weakness

The product does not properly control the allocation and maintenance of a limited resource.

Affected Software

NameVendorStart VersionEnd Version
PhpseclibPhpseclib1.0.0 (including)1.0.23 (excluding)
PhpseclibPhpseclib2.0.0 (including)2.0.47 (excluding)
PhpseclibPhpseclib3.0.0 (including)3.0.36 (excluding)
Php-phpseclibUbuntubionic*
Php-phpseclibUbuntuesm-apps/bionic*
Php-phpseclibUbuntuesm-apps/focal*
Php-phpseclibUbuntuesm-apps/jammy*
Php-phpseclibUbuntuesm-apps/xenial*
Php-phpseclibUbuntufocal*
Php-phpseclibUbuntujammy*
Php-phpseclibUbuntumantic*
Php-phpseclibUbuntuupstream*
Php-phpseclibUbuntuxenial*
Php-phpseclib3Ubuntuesm-apps/jammy*
Php-phpseclib3Ubuntujammy*
Php-phpseclib3Ubuntumantic*
Php-phpseclib3Ubuntuupstream*
PhpseclibUbuntubionic*
PhpseclibUbuntuesm-apps/bionic*
PhpseclibUbuntuesm-apps/focal*
PhpseclibUbuntuesm-apps/jammy*
PhpseclibUbuntuesm-apps/xenial*
PhpseclibUbuntufocal*
PhpseclibUbuntujammy*
PhpseclibUbuntumantic*
PhpseclibUbuntutrusty*
PhpseclibUbuntuupstream*
PhpseclibUbuntuxenial*

Potential Mitigations

  • Mitigation of resource exhaustion attacks requires that the target system either:

  • The first of these solutions is an issue in itself though, since it may allow attackers to prevent the use of the system by a particular valid user. If the attacker impersonates the valid user, they may be able to prevent the user from accessing the server in question.

  • The second solution is simply difficult to effectively institute – and even when properly done, it does not provide a full solution. It simply makes the attack require more resources on the part of the attacker.

References