SecurityTracker.com
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 


Category:   Application (VPN)  >   OpenSSL Vendors:   OpenSSL.org
(IBM Issues Fix for IBM AIX) OpenSSL DTLS Fragment Processing Error Lets Remote Users Consume Excessive Memory Resources
SecurityTracker Alert ID:  1037288
SecurityTracker URL:  http://securitytracker.com/id/1037288
CVE Reference:   CVE-2016-2179   (Links to External Site)
Date:  Nov 15 2016
Impact:   Denial of service via network
Fix Available:  Yes  Vendor Confirmed:  Yes  

Description:   A vulnerability was reported in OpenSSL. A remote user can consume excessive memory on the target system.

A remote user can open a large number of simultaneous connections and send specially crafted DTLS record fragments to fill up buffer queues and consume excessive memory on the target system. The buffer queues are cleared when the connections are closed.

Quan Luo reported this vulnerability.

Impact:   A remote user can consume excessive memory resources on the target system.
Solution:   IBM has issued a fix for IBM AIX:

For OpenSSL 1.0.1: openssl-1.0.1.517.tar.Z
For OpenSSL 1.0.2: openssl-1.0.2.1000.tar.Z
For OpenSSL 1.0.1 FIPS: openssl-20.13.101.500.tar.Z
For OpenSSL 1.0.2 FIPS: openssl-20.13.102.1000.tar.Z

The IBM advisory is available at:

https://aix.software.ibm.com/aix/efixes/security/openssl_advisory21.asc

Vendor URL:  aix.software.ibm.com/aix/efixes/security/openssl_advisory21.asc (Links to External Site)
Cause:   Resource error, State error
Underlying OS:  UNIX (AIX)
Underlying OS Comments:  5.3, 6.1, 7.1, 7.2

Message History:   This archive entry is a follow-up to the message listed below.
Aug 25 2016 OpenSSL DTLS Fragment Processing Error Lets Remote Users Consume Excessive Memory Resources



 Source Message Contents



[Original Message Not Available for Viewing]


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2021, SecurityGlobal.net LLC