First published: Mon Sep 26 2016(Updated: )
statem/statem.c in OpenSSL 1.1.0a does not consider memory-block movement after a realloc call, which allows remote attackers to cause a denial of service (use-after-free) or possibly execute arbitrary code via a crafted TLS session.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
OpenSSL libcrypto | =1.1.0a |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-6309 is considered a high severity vulnerability due to its potential to cause denial of service and execute arbitrary code.
To fix CVE-2016-6309, you should upgrade OpenSSL to a version later than 1.1.0a where this vulnerability has been addressed.
CVE-2016-6309 allows remote attackers to exploit a use-after-free vulnerability, leading to denial of service or arbitrary code execution.
CVE-2016-6309 specifically affects OpenSSL version 1.1.0a.
Yes, CVE-2016-6309 can compromise your application's security by allowing attackers to exploit the vulnerability during TLS sessions.