Description
Matrix SSL 4.x through 4.6.0 and Rambus TLS Toolkit have a length-subtraction integer overflow for Client Hello Pre-Shared Key extension parsing in the TLS 1.3 server. An attacked device calculates an SHA-2 hash over at least 65 KB (in RAM). With a large number of crafted TLS messages, the CPU becomes heavily loaded. This occurs in tls13VerifyBinder and tls13TranscriptHashUpdate.
Published: 2023-12-22
Score: 7.5 High
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

No analysis available yet.

Remediation

No remediation available yet.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

No history.

Subscriptions

Matrixssl Matrixssl
Rambus Tls Toolkit
cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2024-08-02T11:03:18.963Z

Reserved: 2023-01-30T00:00:00.000Z

Link: CVE-2023-24609

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2023-12-22T04:15:08.673

Modified: 2024-11-21T07:48:13.983

Link: CVE-2023-24609

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses