CVE-2016-2179
16.09.2016, 05:59
The DTLS implementation in OpenSSL before 1.1.0 does not properly restrict the lifetime of queue entries associated with unused out-of-order messages, which allows remote attackers to cause a denial of service (memory consumption) by maintaining many crafted DTLS sessions simultaneously, related to d1_lib.c, statem_dtls.c, statem_lib.c, and statem_srvr.c.Enginsight
Vendor | Product | Version |
---|---|---|
openssl | openssl | 1.0.1 |
openssl | openssl | 1.0.1a:a |
openssl | openssl | 1.0.1b:b |
openssl | openssl | 1.0.1c:c |
openssl | openssl | 1.0.1d:d |
openssl | openssl | 1.0.1e:e |
openssl | openssl | 1.0.1f:f |
openssl | openssl | 1.0.1g:g |
openssl | openssl | 1.0.1h:h |
openssl | openssl | 1.0.1i:i |
openssl | openssl | 1.0.1j:j |
openssl | openssl | 1.0.1k:k |
openssl | openssl | 1.0.1l:l |
openssl | openssl | 1.0.1m:m |
openssl | openssl | 1.0.1n:n |
openssl | openssl | 1.0.1o:o |
openssl | openssl | 1.0.1p:p |
openssl | openssl | 1.0.1q:q |
openssl | openssl | 1.0.1r:r |
openssl | openssl | 1.0.1s:s |
openssl | openssl | 1.0.1t:t |
openssl | openssl | 1.0.2 |
openssl | openssl | 1.0.2a:a |
openssl | openssl | 1.0.2b:b |
openssl | openssl | 1.0.2c:c |
openssl | openssl | 1.0.2d:d |
openssl | openssl | 1.0.2e:e |
openssl | openssl | 1.0.2f:f |
openssl | openssl | 1.0.2g:g |
openssl | openssl | 1.0.2h:h |
𝑥
= Vulnerable software versions

Debian Releases

Ubuntu Releases
Ubuntu Product | |||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
openssl |
| ||||||||||||||||||
openssl098 |
|
Common Weakness Enumeration
References