
We found results for “”
CVE-2016-2179
Good to know:

Date: September 15, 2016
The DTLS implementation in OpenSSL before 1.1.0 does not properly restrict the lifetime of queue entries associated with unused out-of-order messages, which allows remote attackers to cause a denial of service (memory consumption) by maintaining many crafted DTLS sessions simultaneously, related to d1_lib.c, statem_dtls.c, statem_lib.c, and statem_srvr.c.
Language: C
Severity Score
Related Resources (28)
Severity Score
Weakness Type (CWE)
Resource Management Errors
CWE-399Top Fix

Upgrade Version
Upgrade to version lib32-openssl - 1:1.0.2.i-1;openssl - 1.0.2.i-1;open_ssl - 1.1.0;openssl - 1.0.2j;org.webjars.npm:nodegit:no_fix
CVSS v3.1
Base Score: |
|
---|---|
Attack Vector (AV): | NETWORK |
Attack Complexity (AC): | LOW |
Privileges Required (PR): | NONE |
User Interaction (UI): | NONE |
Scope (S): | UNCHANGED |
Confidentiality (C): | NONE |
Integrity (I): | NONE |
Availability (A): | HIGH |
CVSS v2
Base Score: |
|
---|---|
Access Vector (AV): | NETWORK |
Access Complexity (AC): | LOW |
Authentication (AU): | NONE |
Confidentiality (C): | NONE |
Integrity (I): | NONE |
Availability (A): | PARTIAL |
Additional information: |