The DTLS implementation in OpenSSL before 1.1.0 does not properly restrict the lifetime of queue entries associated with unused out-of-order messages, which allows remote attackers to cause a denial of service (memory consumption) by maintaining many crafted DTLS sessions simultaneously, related to d1_lib.c, statem_dtls.c, statem_lib.c, and statem_srvr.c.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
History
07 Nov 2023, 02:31
Type | Values Removed | Values Added |
---|---|---|
References |
|
|
Information
Published : 2016-09-16 05:59
Updated : 2024-02-28 15:21
NVD link : CVE-2016-2179
Mitre link : CVE-2016-2179
CVE.ORG link : CVE-2016-2179
JSON object : View
Products Affected
openssl
- openssl
oracle
- linux
CWE
CWE-399
Resource Management Errors