The DTLS implementation in OpenSSL prior to 1.1.0 does not properly restrict the lifetime of queue entries associated with unused out-of-order messages, which allows remote malicious users to cause a denial of service (memory consumption) by maintaining many crafted DTLS sessions simultaneously, related to d1_lib.c, statem_dtls.c, statem_lib.c, and statem_srvr.c.
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
openssl openssl 1.0.1m |
||
openssl openssl 1.0.2a |
||
openssl openssl 1.0.1j |
||
openssl openssl 1.0.1h |
||
openssl openssl 1.0.2e |
||
openssl openssl 1.0.1r |
||
openssl openssl 1.0.2b |
||
openssl openssl 1.0.1c |
||
openssl openssl 1.0.1g |
||
openssl openssl 1.0.2g |
||
openssl openssl 1.0.1a |
||
openssl openssl 1.0.2h |
||
openssl openssl 1.0.1d |
||
openssl openssl 1.0.1t |
||
openssl openssl 1.0.2c |
||
openssl openssl 1.0.1p |
||
openssl openssl 1.0.1k |
||
openssl openssl 1.0.1b |
||
openssl openssl 1.0.1n |
||
openssl openssl 1.0.1q |
||
openssl openssl 1.0.1e |
||
openssl openssl 1.0.1l |
||
openssl openssl 1.0.1f |
||
openssl openssl 1.0.1s |
||
openssl openssl 1.0.1o |
||
openssl openssl 1.0.2 |
||
openssl openssl 1.0.2f |
||
openssl openssl 1.0.1i |
||
openssl openssl 1.0.1 |
||
openssl openssl 1.0.2d |
||
oracle linux 6 |
||
oracle linux 7 |