Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2016-6308

Опубликовано: 21 сент. 2016
Источник: redhat
CVSS3: 3.7
CVSS2: 2.6
EPSS Средний

Описание

statem/statem_dtls.c in the DTLS implementation in OpenSSL 1.1.0 before 1.1.0a allocates memory before checking for an excessive length, which might allow remote attackers to cause a denial of service (memory consumption) via crafted DTLS messages.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 4opensslNot affected
Red Hat Enterprise Linux 5opensslNot affected
Red Hat Enterprise Linux 5openssl097aNot affected
Red Hat Enterprise Linux 6opensslNot affected
Red Hat Enterprise Linux 6openssl098eNot affected
Red Hat Enterprise Linux 7opensslNot affected
Red Hat Enterprise Linux 7openssl098eNot affected
Red Hat JBoss Enterprise Application Platform 5opensslNot affected
Red Hat JBoss Enterprise Application Platform 6opensslNot affected
Red Hat JBoss Enterprise Web Server 1opensslNot affected

Показывать по

Дополнительная информация

Статус:

Low
Дефект:
CWE-400
https://bugzilla.redhat.com/show_bug.cgi?id=1378208openssl: excessive allocation of memory in dtls1_preprocess_fragment()

EPSS

Процентиль: 96%
0.28582
Средний

3.7 Low

CVSS3

2.6 Low

CVSS2

Связанные уязвимости

CVSS3: 5.9
ubuntu
почти 9 лет назад

statem/statem_dtls.c in the DTLS implementation in OpenSSL 1.1.0 before 1.1.0a allocates memory before checking for an excessive length, which might allow remote attackers to cause a denial of service (memory consumption) via crafted DTLS messages.

CVSS3: 5.9
nvd
почти 9 лет назад

statem/statem_dtls.c in the DTLS implementation in OpenSSL 1.1.0 before 1.1.0a allocates memory before checking for an excessive length, which might allow remote attackers to cause a denial of service (memory consumption) via crafted DTLS messages.

CVSS3: 5.9
debian
почти 9 лет назад

statem/statem_dtls.c in the DTLS implementation in OpenSSL 1.1.0 befor ...

CVSS3: 5.9
github
больше 3 лет назад

statem/statem_dtls.c in the DTLS implementation in OpenSSL 1.1.0 before 1.1.0a allocates memory before checking for an excessive length, which might allow remote attackers to cause a denial of service (memory consumption) via crafted DTLS messages.

CVSS3: 5.9
fstec
почти 9 лет назад

Уязвимость компонента statem/statem_dtls.c библиотеки OpenSSL, позволяющая нарушителю вызвать отказ в обслуживании

EPSS

Процентиль: 96%
0.28582
Средний

3.7 Low

CVSS3

2.6 Low

CVSS2