The dtls1_buffer_record function in ssl/d1_pkt.c in OpenSSL 0.9.8k and earlier 0.9.8 versions allows remote attackers to cause a denial of service (memory consumption) via a large series of "future epoch" DTLS records that are buffered in a queue, aka "DTLS record buffer limitation bug."
References
Configurations
History
07 Feb 2024, 18:01
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:openssl:openssl:0.9.8i:*:*:*:*:*:*:* cpe:2.3:a:openssl:openssl:0.9.8a:*:*:*:*:*:*:* cpe:2.3:a:openssl:openssl:0.9.8:beta4:*:*:*:*:*:* cpe:2.3:a:openssl:openssl:0.9.8b:*:*:*:*:*:*:* cpe:2.3:a:openssl:openssl:0.9.8h:*:*:*:*:*:*:* cpe:2.3:a:openssl:openssl:0.9.8c:*:*:*:*:*:*:* cpe:2.3:a:openssl:openssl:0.9.8:beta5:*:*:*:*:*:* cpe:2.3:a:openssl:openssl:0.9.8j:*:*:*:*:*:*:* cpe:2.3:a:openssl:openssl:0.9.8e:*:*:*:*:*:*:* cpe:2.3:a:openssl:openssl:0.9.8:beta2:*:*:*:*:*:* cpe:2.3:a:openssl:openssl:0.9.8c-1:*:*:*:*:*:*:* cpe:2.3:a:openssl:openssl:0.9.8d:*:*:*:*:*:*:* cpe:2.3:a:openssl:openssl:0.9.8g-9:*:*:*:*:*:*:* cpe:2.3:a:openssl:openssl:0.9.8:beta6:*:*:*:*:*:* cpe:2.3:a:openssl:openssl:0.9.8:beta1:*:*:*:*:*:* cpe:2.3:a:openssl:openssl:0.9.8:beta3:*:*:*:*:*:* cpe:2.3:a:openssl:openssl:0.9.8g:*:*:*:*:*:*:* cpe:2.3:a:openssl:openssl:0.9.8:-:*:*:*:*:*:* cpe:2.3:a:openssl:openssl:0.9.8f:*:*:*:*:*:*:* |
Information
Published : 2009-05-19 19:30
Updated : 2024-02-28 11:21
NVD link : CVE-2009-1377
Mitre link : CVE-2009-1377
CVE.ORG link : CVE-2009-1377
JSON object : View
Products Affected
openssl
- openssl
CWE
CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer