[Bug 3771] New: Will future versions of openssh provide DDoS attack defense for the DH algorithm?:CVE-2024-41996

bugzilla-daemon at mindrot.org bugzilla-daemon at mindrot.org
Thu Jan 2 13:35:49 AEDT 2025


https://bugzilla.mindrot.org/show_bug.cgi?id=3771

            Bug ID: 3771
           Summary: Will future versions of openssh provide DDoS attack
                    defense for the DH algorithm?:CVE-2024-41996
           Product: Portable OpenSSH
           Version: 9.9p1
          Hardware: Other
                OS: All
            Status: NEW
          Severity: enhancement
          Priority: P5
         Component: sshd
          Assignee: unassigned-bugs at mindrot.org
          Reporter: bty at mail.ustc.edu.cn

CVE-2024-41996:
Validating the order of the public keys in the Diffie-Hellman Key
Agreement Protocol, when an approved safe prime is used, allows remote
attackers (from the client side) to trigger unnecessarily expensive
server-side DHE modular-exponentiation calculations. The client may
cause asymmetric resource consumption. The basic attack scenario is
that the client must claim that it can only communicate with DHE, and
the server must be configured to allow DHE and validate the order of
the public key.

Historically, there have also been some implementation flaws can
seriously affect the effectiveness of the D(HE)at attack, such as
CVE-2002-20001,CVE-2022-40735.

What will openssh do to avoid dheater?

-- 
You are receiving this mail because:
You are watching the assignee of the bug.


More information about the openssh-bugs mailing list