First published: Mon Sep 26 2016(Updated: )
statem/statem_dtls.c in the DTLS implementation in OpenSSL 1.1.0 before 1.1.0a allocates memory before checking for an excessive length, which might allow remote attackers to cause a denial of service (memory consumption) via crafted DTLS messages.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
OpenSSL libcrypto | =1.1.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-6308 has been rated as a high severity vulnerability due to its potential to cause denial of service.
To mitigate CVE-2016-6308, you should upgrade OpenSSL to version 1.1.0a or later.
CVE-2016-6308 could allow remote attackers to cause a denial of service through crafted DTLS messages.
OpenSSL version 1.1.0 before version 1.1.0a is affected by CVE-2016-6308.
The primary impact of CVE-2016-6308 is excessive memory consumption leading to denial of service.