First published: Mon Sep 26 2016(Updated: )
The state-machine implementation in OpenSSL 1.1.0 before 1.1.0a allocates memory before checking for an excessive length, which might allow remote attackers to cause a denial of service (memory consumption) via crafted TLS messages, related to statem/statem.c and statem/statem_lib.c.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
OpenSSL libcrypto | =1.1.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-6307 has a severity level categorized as high due to its potential to cause denial of service.
To fix CVE-2016-6307, upgrade your OpenSSL version to 1.1.0a or later.
CVE-2016-6307 specifically affects OpenSSL version 1.1.0.
CVE-2016-6307 allows remote attackers to launch a denial of service attack by exploiting memory consumption vulnerabilities.
There are no official workarounds for CVE-2016-6307 other than upgrading to a fixed version of OpenSSL.