The DTLS implementation in OpenSSL before 1.1.0 does not properly restrict the lifetime of queue entries associated with unused out-of-order messages, which allows remote attackers to cause a denial of service (memory consumption) by maintaining many crafted DTLS sessions simultaneously, related to d1_lib.c, statem_dtls.c, statem_lib.c, and statem_srvr.c.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Information
Published : 2016-09-15 22:59
Updated : 2022-12-13 04:15
NVD link : CVE-2016-2179
Mitre link : CVE-2016-2179
JSON object : View
CWE
CWE-399
Resource Management Errors
Products Affected
openssl
- openssl
oracle
- linux