Description
Matrix SSL 4.x through 4.6.0 and Rambus TLS Toolkit have a length-subtraction integer overflow for Client Hello Pre-Shared Key extension parsing in the TLS 1.3 server. An attacked device calculates an SHA-2 hash over at least 65 KB (in RAM). With a large number of crafted TLS messages, the CPU becomes heavily loaded. This occurs in tls13VerifyBinder and tls13TranscriptHashUpdate.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
No advisories yet.
References
History
No history.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-02T11:03:18.963Z
Reserved: 2023-01-30T00:00:00.000Z
Link: CVE-2023-24609
No data.
Status : Modified
Published: 2023-12-22T04:15:08.673
Modified: 2024-11-21T07:48:13.983
Link: CVE-2023-24609
No data.
OpenCVE Enrichment
No data.
Weaknesses