CVE-2016-2179

CVE Details

Release Date:2016-06-30
Impact:Moderate What is this?

Description


The DTLS implementation in OpenSSL before 1.1.0 does not properlyrestrict the lifetime of queue entries associated with unused out-of-order messages, which allows remote attackers to cause a denial of service (memory consumption) by maintaining many crafted DTLS sessions simultaneously, related to d1_lib.c, statem_dtls.c, statem_lib.c, and statem_srvr.c.

See more information about CVE-2016-2179 from MITRE CVE dictionary and NIST NVD


NOTE: The following CVSS metrics and score provided are preliminary and subject to review.


CVSS v2 metrics

Base Score: 5.0
Vector String: AV:N/AC:L/Au:N/C:N/I:N/A:P
Version: 2.0
Attack Vector: Network
Attack Complexity: Low
Authentication: None
Confidentiality Impact: None
Integrity Impact: None
Availability Impact: Partial

Errata information


PlatformErrataRelease Date
Oracle Linux version 6 (openssl)ELSA-2016-19402016-09-27
Oracle Linux version 6 (openssl)ELSA-2016-36212016-09-27
Oracle Linux version 7 (openssl)ELSA-2016-19402016-09-27
Oracle Linux version 7 (openssl)ELSA-2016-36212016-09-27
Oracle VM version 3.3 (openssl)OVMSA-2016-01352016-09-27
Oracle VM version 3.4 (openssl)OVMSA-2016-01352016-09-27


This page is generated automatically and has not been checked for errors or omissions. For clarification or corrections:

software.hardware.complete