The DTLS implementation in OpenSSL before 1.1.0 does not properly restrict the lifetime of queue entries associated with unused out-of-order messages, which allows remote attackers to cause a denial of service (memory consumption) by maintaining many crafted DTLS sessions simultaneously, related to d1_lib.c, statem_dtls.c, statem_lib.c, and statem_srvr.c.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
History
No history.
Information
Published : 2016-09-16 05:59
Updated : 2023-11-07 02:31
NVD link : CVE-2016-2179
Mitre link : CVE-2016-2179
CVE.ORG link : CVE-2016-2179
JSON object : View
Products Affected
openssl
- openssl
oracle
- linux
CWE
CWE-399
Resource Management Errors