Matrix SSL 4.x through 4.6.0 and Rambus TLS Toolkit have a length-subtraction integer overflow for Client Hello Pre-Shared Key extension parsing in the TLS 1.3 server. An attacked device calculates an SHA-2 hash over at least 65 KB (in RAM). With a large number of crafted TLS messages, the CPU becomes heavily loaded. This occurs in tls13VerifyBinder and tls13TranscriptHashUpdate.
References
Link | Resource |
---|---|
https://www.rambus.com/security/software-protocols/tls-toolkit/ | Product |
https://www.telekom.com/en/company/data-privacy-and-security/news/advisories-504842 | Exploit Third Party Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: mitre
Published: 2023-12-22T00:00:00
Updated: 2023-12-22T03:45:20.227468
Reserved: 2023-01-30T00:00:00
Link: CVE-2023-24609
JSON object: View
NVD Information
Status : Analyzed
Published: 2023-12-22T04:15:08.673
Modified: 2024-01-03T20:34:37.670
Link: CVE-2023-24609
JSON object: View
Redhat Information
No data.
CWE