First published: Fri Jan 22 2016(Updated: )
wolfSSL (formerly CyaSSL) before 3.6.8 allows remote attackers to cause a denial of service (resource consumption or traffic amplification) via a crafted DTLS cookie in a ClientHello message.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
wolfSSL | <=3.6.6 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2015-6925 is classified as a denial of service vulnerability, allowing attackers to exhaust resources.
To mitigate CVE-2015-6925, upgrade wolfSSL to version 3.6.8 or later.
CVE-2015-6925 is caused by insufficient validation of crafted DTLS cookies in a ClientHello message.
Any user or system utilizing wolfSSL versions prior to 3.6.8 is susceptible to CVE-2015-6925.
CVE-2015-6925 does not directly lead to data breaches, but it can disrupt service availability.