OpenSSL DTLS Fragment Processing Error Lets Remote Users Consume Excessive Memory Resources
|
SecurityTracker Alert ID: 1036689 |
SecurityTracker URL: http://securitytracker.com/id/1036689
|
CVE Reference:
CVE-2016-2179
(Links to External Site)
|
Date: Aug 25 2016
|
Impact:
Denial of service via network
|
Fix Available: Yes Vendor Confirmed: Yes
|
|
Description:
A vulnerability was reported in OpenSSL. A remote user can consume excessive memory on the target system.
A remote user can open a large number of simultaneous connections and send specially crafted DTLS record fragments to fill up buffer queues and consume excessive memory on the target system. The buffer queues are cleared when the connections are closed.
Quan Luo reported this vulnerability.
|
Impact:
A remote user can consume excessive memory resources on the target system.
|
Solution:
The vendor has issued a source code fix, available at:
https://github.com/openssl/openssl/commit/00a4c1421407b6ac796688871b0a49a179c694d9
|
Vendor URL: openssl.org/ (Links to External Site)
|
Cause:
Resource error, State error
|
Underlying OS: Linux (Any), UNIX (Any), Windows (Any)
|
|
Message History:
This archive entry has one or more follow-up message(s) listed below.
|
Source Message Contents
|
|
[Original Message Not Available for Viewing]
|
|