5
CVSSv2

CVE-2009-1378

Published: 19/05/2009 Updated: 07/02/2024
CVSS v2 Base Score: 5 | Impact Score: 2.9 | Exploitability Score: 10
VMScore: 445
Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P

Vulnerability Summary

Multiple memory leaks in the dtls1_process_out_of_seq_message function in ssl/d1_both.c in OpenSSL 0.9.8k and previous versions 0.9.8 versions allow remote malicious users to cause a denial of service (memory consumption) via DTLS records that (1) are duplicates or (2) have sequence numbers much greater than current sequence numbers, aka "DTLS fragment handling memory leak."

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

openssl openssl

canonical ubuntu linux 9.04

canonical ubuntu linux 8.10

canonical ubuntu linux 8.04

canonical ubuntu linux 6.06

Vendor Advisories

Debian Bug report logs - #530400 CVE-2009-137{7,8,9} Package: openssl; Maintainer for openssl is Debian OpenSSL Team <pkg-openssl-devel@listsaliothdebianorg>; Source for openssl is src:openssl (PTS, buildd, popcon) Reported by: Giuseppe Iuculano <giuseppe@iuculanoit> Date: Sun, 24 May 2009 16:21:01 UTC Severity: ...
It was discovered that OpenSSL did not limit the number of DTLS records it would buffer when they arrived with a future epoch A remote attacker could cause a denial of service via memory resource consumption by sending a large number of crafted requests (CVE-2009-1377) ...

Exploits

OpenSSL versions 098k and 100-beta2 DTLS remote memory exhaustion denial of service exploit ...
OpenSSL versions below 098i DTLS ChangeCipherSpec remote denial of service exploit ...

References

CWE-401http://www.securityfocus.com/bid/35001http://marc.info/?l=openssl-dev&m=124263491424212&w=2https://launchpad.net/bugs/cve/2009-1378http://secunia.com/advisories/35128http://www.openwall.com/lists/oss-security/2009/05/18/1http://marc.info/?l=openssl-dev&m=124247679213944&w=2http://cvs.openssl.org/chngview?cn=18188http://rt.openssl.org/Ticket/Display.html?id=1931&user=guest&pass=guesthttp://www.mandriva.com/security/advisories?name=MDVSA-2009:120http://www.vupen.com/english/advisories/2009/1377http://www.securitytracker.com/id?1022241http://lists.opensuse.org/opensuse-security-announce/2009-06/msg00003.htmlhttp://secunia.com/advisories/35416http://secunia.com/advisories/35461http://www.ubuntu.com/usn/USN-792-1http://secunia.com/advisories/35571ftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2009-009.txt.aschttp://secunia.com/advisories/35729http://voodoo-circle.sourceforge.net/sa/sa-20091012-01.htmlhttp://secunia.com/advisories/37003http://sourceforge.net/mailarchive/message.php?msg_name=4AD43807.7080105%40users.sourceforge.nethttp://security.gentoo.org/glsa/glsa-200912-01.xmlhttp://secunia.com/advisories/38761http://slackware.com/security/viewer.php?l=slackware-security&y=2010&m=slackware-security.663049http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c02029444http://secunia.com/advisories/38834http://lists.vmware.com/pipermail/security-announce/2010/000082.htmlhttp://secunia.com/advisories/38794http://www.vupen.com/english/advisories/2010/0528https://kb.bluecoat.com/index?page=content&id=SA50http://secunia.com/advisories/42724http://secunia.com/advisories/42733http://www.redhat.com/support/errata/RHSA-2009-1335.htmlhttp://secunia.com/advisories/36533https://www.exploit-db.com/exploits/8720https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7229https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11309https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=530400https://usn.ubuntu.com/792-1/https://nvd.nist.gov