Related Vulnerabilities: CVE-2016-2179  

In a DTLS connection where handshake messages are delivered out-of-order those messages that OpenSSL is not yet ready to process will be buffered for later use. Under certain circumstances, a flaw in the logic means that those messages do not get removed from the buffer even though the handshake has been completed. An attacker could force up to approx. 15 messages to remain in the buffer when they are no longer required. These messages will be cleared when the DTLS connection is closed. The default maximum size for a message is 100k. Therefore the attacker could force an additional 1500k to be consumed per connection. By opening many simultaneous connections an attacker could cause a DoS attack through memory exhaustion.

Severity Low

Remote Yes

Type Denial of service

Description

In a DTLS connection where handshake messages are delivered out-of-order those messages that OpenSSL is not yet ready to process will be buffered for later use. Under certain circumstances, a flaw in the logic means that those messages do not get removed from the buffer even though the handshake has been completed.
An attacker could force up to approx. 15 messages to remain in the buffer when they are no longer required. These messages will be cleared when the DTLS connection is closed. The default maximum size for a message is 100k. Therefore the attacker could force an additional 1500k to be consumed per connection. By opening many simultaneous connections an attacker could cause a DoS attack through memory exhaustion.

AVG-30 lib32-openssl 1:1.0.2.h-1 1:1.0.2.i-1 High Fixed

AVG-29 openssl 1.0.2.h-1 1.0.2.i-1 High Fixed FS#49616

26 Sep 2016 ASA-201609-24 AVG-30 lib32-openssl High multiple issues

26 Sep 2016 ASA-201609-23 AVG-29 openssl High multiple issues

https://www.openssl.org/news/secadv/20160922.txt