vendor:
OpenSSL
by:
Jon Oberheide
7,8
CVSS
HIGH
Denial of Service
400
CWE
Product Name: OpenSSL
Affected Version From: OpenSSL <= 0.9.8k
Affected Version To: OpenSSL 1.0.0-beta2
Patch Exists: YES
Related CWE: CVE-2009-1378
CPE: 2.6:a:openssl:openssl:0.9.8k
Metasploit:
https://www.rapid7.com/db/vulnerabilities/linuxrpm-RHSA-2009-1335/, https://www.rapid7.com/db/vulnerabilities/http-openssl-cve-2009-1378/, https://www.rapid7.com/db/vulnerabilities/centos_linux-cve-2009-1378/, https://www.rapid7.com/db/vulnerabilities/hpsmh-cve-2009-1378/, https://www.rapid7.com/db/vulnerabilities/suse-cve-2009-1378/, https://www.rapid7.com/db/vulnerabilities/gentoo-linux-cve-2009-1378/, https://www.rapid7.com/db/vulnerabilities/vmsa-2010-0009-1-service-console-package-openssl-cve-2009-1378/, https://www.rapid7.com/db/vulnerabilities/oracle_linux-cve-2009-1378/
Other Scripts:
N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References:
N/A
Nuclei Metadata: N/A
Platforms Tested: Linux, Windows, Mac
2009
OpenSSL <= 0.9.8k, 1.0.0-beta2 DTLS Remote Memory Exhaustion DoS
In dtls1_process_out_of_seq_message() the check if the current message is already buffered was missing. For every new message was memory allocated, allowing an attacker to perform an denial of service attack with sending out of seq handshake messages until there is no memory left.
Mitigation:
Upgrade to OpenSSL version 0.9.8l or 1.0.0