oss-sec mailing list archives
Two OpenSSL DTLS remote DoS
From: Mark J Cox <mjc () redhat com>
Date: Mon, 18 May 2009 09:32:04 +0100 (BST)
Spotted on openssl-dev, two issues that can lead to a remote attacker exhausting memory of a DTLS enabled service. DTLS support was introduced in OpenSSL 0.9.8.
CVE-2009-1377 DTLS epoch record buffer memory DoS http://rt.openssl.org/Ticket/Display.html?id=1930&user=guest&pass=guest http://marc.info/?l=openssl-dev&m=124247675613888&w=2 http://cvs.openssl.org/chngview?cn=18187 CVSSv2= 5.0/AV:N/AC:L/Au:N/C:N/I:N/A:P CVE-2009-1378 DTLS fragment handling memory DoS http://rt.openssl.org/Ticket/Display.html?id=1931&user=guest&pass=guest http://marc.info/?t=124250665500033&r=1&w=2 http://cvs.openssl.org/chngview?cn=18188 (Note doesn't have a backported 0.9.8 patch yet, follow openssl-dev) CVSSv2= 5.0/AV:N/AC:L/Au:N/C:N/I:N/A:P Thanks, Mark
Current thread:
- Two OpenSSL DTLS remote DoS Mark J Cox (May 18)
- Re: Two OpenSSL DTLS remote DoS Mark J Cox (May 18)
- Re: Two OpenSSL DTLS remote DoS Tomas Hoger (Jun 02)
- Re: Two OpenSSL DTLS remote DoS Mark J Cox (May 18)