The DHcheckpubkey function in crypto/dh/dhcheck.c in OpenSSL 1.0.2 before 1.0.2f does not ensure that prime numbers are appropriate for Diffie-Hellman (DH) key exchange, which makes it easier for remote attackers to discover a private DH exponent by making multiple handshakes with a peer that chose an inappropriate number, as demonstrated by a number in an X9.42 file.
{
"versions": [
{
"introduced": "0"
},
{
"last_affected": "1.0.2"
},
{
"introduced": "0"
},
{
"last_affected": "1.0.2-beta1"
},
{
"introduced": "0"
},
{
"last_affected": "1.0.2-beta2"
},
{
"introduced": "0"
},
{
"last_affected": "1.0.2-beta3"
},
{
"introduced": "0"
},
{
"last_affected": "1.0.2a"
},
{
"introduced": "0"
},
{
"last_affected": "1.0.2b"
},
{
"introduced": "0"
},
{
"last_affected": "1.0.2c"
},
{
"introduced": "0"
},
{
"last_affected": "1.0.2d"
},
{
"introduced": "0"
},
{
"last_affected": "1.0.2e"
}
]
}