First published: Tue Jul 05 2016(Updated: )
A flaw was found in the Datagram TLS (DTLS) replay protection implementation in OpenSSL. A remote attacker could possibly use this flaw to make a DTLS server using OpenSSL to reject further packets sent from a DTLS client over an established DTLS connection.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/openssl | <0:1.0.1e-48.el6_8.3 | 0:1.0.1e-48.el6_8.3 |
redhat/openssl | <1:1.0.1e-51.el7_2.7 | 1:1.0.1e-51.el7_2.7 |
redhat/openssl | <1.0.1 | 1.0.1 |
redhat/openssl | <1.0.2 | 1.0.2 |
OpenSSL | =1.0.1 | |
OpenSSL | =1.0.1a | |
OpenSSL | =1.0.1b | |
OpenSSL | =1.0.1c | |
OpenSSL | =1.0.1d | |
OpenSSL | =1.0.1e | |
OpenSSL | =1.0.1f | |
OpenSSL | =1.0.1g | |
OpenSSL | =1.0.1h | |
OpenSSL | =1.0.1i | |
OpenSSL | =1.0.1j | |
OpenSSL | =1.0.1k | |
OpenSSL | =1.0.1l | |
OpenSSL | =1.0.1m | |
OpenSSL | =1.0.1n | |
OpenSSL | =1.0.1o | |
OpenSSL | =1.0.1p | |
OpenSSL | =1.0.1q | |
OpenSSL | =1.0.1r | |
OpenSSL | =1.0.1s | |
OpenSSL | =1.0.1t | |
OpenSSL | =1.0.2 | |
OpenSSL | =1.0.2a | |
OpenSSL | =1.0.2b | |
OpenSSL | =1.0.2c | |
OpenSSL | =1.0.2d | |
OpenSSL | =1.0.2e | |
OpenSSL | =1.0.2f | |
OpenSSL | =1.0.2g | |
OpenSSL | =1.0.2h | |
Oracle Linux | =6 | |
Oracle Linux | =7 | |
debian/openssl | 1.1.1w-0+deb11u1 1.1.1w-0+deb11u2 3.0.15-1~deb12u1 3.0.14-1~deb12u2 3.4.1-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-2181 has been classified as a moderate severity vulnerability.
To fix CVE-2016-2181, you should upgrade OpenSSL to a version that addresses this vulnerability, such as 1.0.1, 1.0.2, or any later versions.
CVE-2016-2181 affects OpenSSL versions prior to 1.0.2 and specifically versions such as 1.0.1e and earlier.
Yes, CVE-2016-2181 can be exploited by a remote attacker to disrupt client-server communications.
CVE-2016-2181 can lead to denial of service by causing the DTLS server to reject packets from clients, disrupting established connections.