CVE Vulnerabilities

CVE-2024-27355

Uncontrolled Resource Consumption

Published: Mar 01, 2024 | Modified: Sep 15, 2025
CVSS 3.x
N/A
Source:
NVD
CVSS 2.x
RedHat/V2
RedHat/V3
Ubuntu
MEDIUM

An issue was discovered in phpseclib 1.x before 1.0.23, 2.x before 2.0.47, and 3.x before 3.0.36. When processing the ASN.1 object identifier of a certificate, a sub identifier may be provided that leads to a denial of service (CPU consumption for decodeOID).

Weakness

The product does not properly control the allocation and maintenance of a limited resource.

Affected Software

Name Vendor Start Version End Version
Phpseclib Phpseclib 1.0.0 (including) 1.0.23 (excluding)
Phpseclib Phpseclib 2.0.0 (including) 2.0.47 (excluding)
Phpseclib Phpseclib 3.0.0 (including) 3.0.36 (excluding)
Php-phpseclib Ubuntu bionic *
Php-phpseclib Ubuntu esm-apps/focal *
Php-phpseclib Ubuntu esm-apps/jammy *
Php-phpseclib Ubuntu focal *
Php-phpseclib Ubuntu jammy *
Php-phpseclib Ubuntu mantic *
Php-phpseclib Ubuntu upstream *
Php-phpseclib Ubuntu xenial *
Php-phpseclib3 Ubuntu esm-apps/jammy *
Php-phpseclib3 Ubuntu jammy *
Php-phpseclib3 Ubuntu mantic *
Php-phpseclib3 Ubuntu upstream *
Phpseclib Ubuntu bionic *
Phpseclib Ubuntu esm-apps/focal *
Phpseclib Ubuntu esm-apps/jammy *
Phpseclib Ubuntu focal *
Phpseclib Ubuntu jammy *
Phpseclib Ubuntu mantic *
Phpseclib Ubuntu trusty *
Phpseclib Ubuntu upstream *
Phpseclib Ubuntu xenial *

Potential Mitigations

  • Mitigation of resource exhaustion attacks requires that the target system either:

  • The first of these solutions is an issue in itself though, since it may allow attackers to prevent the use of the system by a particular valid user. If the attacker impersonates the valid user, they may be able to prevent the user from accessing the server in question.

  • The second solution is simply difficult to effectively institute – and even when properly done, it does not provide a full solution. It simply makes the attack require more resources on the part of the attacker.

References