First published: Thu May 04 2017(Updated: )
In OpenSSL 1.1.0 before 1.1.0c, TLS connections using *-CHACHA20-POLY1305 ciphersuites are susceptible to a DoS attack by corrupting larger payloads. This can result in an OpenSSL crash. This issue is not considered to be exploitable beyond a DoS.
Credit: openssl-security@openssl.org
Affected Software | Affected Version | How to fix |
---|---|---|
OpenSSL libcrypto | =1.1.0 | |
OpenSSL libcrypto | =1.1.0a | |
OpenSSL libcrypto | =1.1.0b |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-7054 is classified as a denial of service vulnerability.
To mitigate CVE-2016-7054, upgrade OpenSSL to version 1.1.0c or later.
CVE-2016-7054 can cause affected OpenSSL versions to crash during TLS connections with certain ciphersuites.
CVE-2016-7054 affects OpenSSL versions 1.1.0 through 1.1.0b.
CVE-2016-7054 is not considered exploitable beyond causing a denial of service.