A denial of service flaw was found in OpenSSL 0.9.8, 1.0.1, 1.0.2 through 1.0.2h, and 1.1.0 in the way the TLS/SSL protocol defined processing of ALERT packets during a connection handshake. A remote attacker could use this flaw to make a TLS/SSL server consume an excessive amount of CPU and fail to accept connections from other clients.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
Configuration 4 (hide)
AND |
|
Configuration 5 (hide)
AND |
|
Configuration 6 (hide)
|
Information
Published : 2017-11-13 14:29
Updated : 2023-02-12 15:25
NVD link : CVE-2016-8610
Mitre link : CVE-2016-8610
JSON object : View
CWE
CWE-400
Uncontrolled Resource Consumption
Products Affected
netapp
- data_ontap_edge
- cn1610
- storagegrid
- snapdrive
- ontap_select_deploy
- oncommand_balance
- oncommand_unified_manager
- snapcenter_server
- clustered_data_ontap_antivirus_connector
- oncommand_workflow_automation
- host_agent
- e-series_santricity_os_controller
- clustered_data_ontap
- cn1610_firmware
- data_ontap
- service_processor
- smi-s_provider
- storagegrid_webscale
redhat
- jboss_enterprise_application_platform
- enterprise_linux
- enterprise_linux_server_aus
- enterprise_linux_workstation
- enterprise_linux_server_eus
- enterprise_linux_desktop
- enterprise_linux_server_tus
- enterprise_linux_server
debian
- debian_linux
openssl
- openssl