Описание
The dtls1_buffer_record function in ssl/d1_pkt.c in OpenSSL 0.9.8k and earlier 0.9.8 versions allows remote attackers to cause a denial of service (memory consumption) via a large series of "future epoch" DTLS records that are buffered in a queue, aka "DTLS record buffer limitation bug."
Релиз | Статус | Примечание |
---|---|---|
dapper | released | 0.9.8a-7ubuntu0.9 |
devel | released | 0.9.8g-16ubuntu2 |
hardy | released | 0.9.8g-4ubuntu3.7 |
intrepid | released | 0.9.8g-10.1ubuntu2.4 |
jaunty | released | 0.9.8g-15ubuntu3.2 |
upstream | needs-triage |
Показывать по
5 Medium
CVSS2
Связанные уязвимости
The dtls1_buffer_record function in ssl/d1_pkt.c in OpenSSL 0.9.8k and earlier 0.9.8 versions allows remote attackers to cause a denial of service (memory consumption) via a large series of "future epoch" DTLS records that are buffered in a queue, aka "DTLS record buffer limitation bug."
The dtls1_buffer_record function in ssl/d1_pkt.c in OpenSSL 0.9.8k and earlier 0.9.8 versions allows remote attackers to cause a denial of service (memory consumption) via a large series of "future epoch" DTLS records that are buffered in a queue, aka "DTLS record buffer limitation bug."
The dtls1_buffer_record function in ssl/d1_pkt.c in OpenSSL 0.9.8k and ...
The dtls1_buffer_record function in ssl/d1_pkt.c in OpenSSL 0.9.8k and earlier 0.9.8 versions allows remote attackers to cause a denial of service (memory consumption) via a large series of "future epoch" DTLS records that are buffered in a queue, aka "DTLS record buffer limitation bug."
Уязвимости операционной системы Gentoo Linux, позволяющие удаленному злоумышленнику нарушить целостность и доступность защищаемой информации
5 Medium
CVSS2