Описание
statem/statem_dtls.c in the DTLS implementation in OpenSSL 1.1.0 before 1.1.0a allocates memory before checking for an excessive length, which might allow remote attackers to cause a denial of service (memory consumption) via crafted DTLS messages.
Релиз | Статус | Примечание |
---|---|---|
devel | not-affected | |
esm-infra-legacy/trusty | not-affected | |
esm-infra/xenial | not-affected | |
precise | not-affected | |
trusty | not-affected | |
trusty/esm | not-affected | |
upstream | needs-triage | |
vivid/stable-phone-overlay | not-affected | |
vivid/ubuntu-core | not-affected | |
xenial | not-affected |
Показывать по
Релиз | Статус | Примечание |
---|---|---|
devel | DNE | |
esm-infra-legacy/trusty | DNE | trusty/esm was DNE [trusty was not-affected] |
precise | not-affected | |
trusty | not-affected | |
trusty/esm | DNE | trusty was not-affected |
upstream | needs-triage | |
vivid/stable-phone-overlay | DNE | |
vivid/ubuntu-core | DNE | |
xenial | DNE |
Показывать по
EPSS
7.1 High
CVSS2
5.9 Medium
CVSS3
Связанные уязвимости
statem/statem_dtls.c in the DTLS implementation in OpenSSL 1.1.0 before 1.1.0a allocates memory before checking for an excessive length, which might allow remote attackers to cause a denial of service (memory consumption) via crafted DTLS messages.
statem/statem_dtls.c in the DTLS implementation in OpenSSL 1.1.0 before 1.1.0a allocates memory before checking for an excessive length, which might allow remote attackers to cause a denial of service (memory consumption) via crafted DTLS messages.
statem/statem_dtls.c in the DTLS implementation in OpenSSL 1.1.0 befor ...
statem/statem_dtls.c in the DTLS implementation in OpenSSL 1.1.0 before 1.1.0a allocates memory before checking for an excessive length, which might allow remote attackers to cause a denial of service (memory consumption) via crafted DTLS messages.
Уязвимость компонента statem/statem_dtls.c библиотеки OpenSSL, позволяющая нарушителю вызвать отказ в обслуживании
EPSS
7.1 High
CVSS2
5.9 Medium
CVSS3