Total vulnerabilities in the database
The DTLS implementation in OpenSSL before 1.1.0 does not properly restrict the lifetime of queue entries associated with unused out-of-order messages, which allows remote attackers to cause a denial of service (memory consumption) by maintaining many crafted DTLS sessions simultaneously, related to d1_lib.c, statem_dtls.c, statem_lib.c, and statem_srvr.c.
Software | From | Fixed in |
---|---|---|
openssl / openssl | 1.0.1m | 1.0.1m.x |
openssl / openssl | 1.0.2a | 1.0.2a.x |
openssl / openssl | 1.0.1j | 1.0.1j.x |
openssl / openssl | 1.0.1h | 1.0.1h.x |
openssl / openssl | 1.0.2e | 1.0.2e.x |
openssl / openssl | 1.0.1r | 1.0.1r.x |
openssl / openssl | 1.0.2b | 1.0.2b.x |
openssl / openssl | 1.0.1c | 1.0.1c.x |
openssl / openssl | 1.0.1g | 1.0.1g.x |
openssl / openssl | 1.0.2g | 1.0.2g.x |
openssl / openssl | 1.0.1a | 1.0.1a.x |
openssl / openssl | 1.0.2h | 1.0.2h.x |
openssl / openssl | 1.0.1d | 1.0.1d.x |
openssl / openssl | 1.0.1t | 1.0.1t.x |
openssl / openssl | 1.0.2c | 1.0.2c.x |
openssl / openssl | 1.0.1p | 1.0.1p.x |
openssl / openssl | 1.0.1k | 1.0.1k.x |
openssl / openssl | 1.0.1b | 1.0.1b.x |
openssl / openssl | 1.0.1n | 1.0.1n.x |
openssl / openssl | 1.0.1q | 1.0.1q.x |
openssl / openssl | 1.0.1e | 1.0.1e.x |
openssl / openssl | 1.0.1l | 1.0.1l.x |
openssl / openssl | 1.0.1f | 1.0.1f.x |
openssl / openssl | 1.0.1s | 1.0.1s.x |
openssl / openssl | 1.0.1o | 1.0.1o.x |
openssl / openssl | 1.0.2 | 1.0.2.x |
openssl / openssl | 1.0.2f | 1.0.2f.x |
openssl / openssl | 1.0.1i | 1.0.1i.x |
openssl / openssl | 1.0.1 | 1.0.1.x |
openssl / openssl | 1.0.2d | 1.0.2d.x |
oracle / linux | 6 | 6.x |
oracle / linux | 7 | 7.x |