5

CVE-2009-1377

The dtls1_buffer_record function in ssl/d1_pkt.c in OpenSSL 0.9.8k and earlier 0.9.8 versions allows remote attackers to cause a denial of service (memory consumption) via a large series of "future epoch" DTLS records that are buffered in a queue, aka "DTLS record buffer limitation bug."

Daten sind bereitgestellt durch National Vulnerability Database (NVD)
OpenSSLOpenSSL Version >= 0.9.8 < 0.9.8m
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 3.44% 0.87
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String
nvd@nist.gov 5 10 2.9
AV:N/AC:L/Au:N/C:N/I:N/A:P
CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

The product performs operations on a memory buffer, but it reads from or writes to a memory location outside the buffer's intended boundary. This may result in read or write operations on unexpected memory locations that could be linked to other variables, data structures, or internal program data.

http://www.vupen.com/english/advisories/2010/0528
Third Party Advisory
Permissions Required
http://cvs.openssl.org/chngview?cn=18187
Patch
Third Party Advisory
Broken Link
http://marc.info/?l=openssl-dev&m=124247675613888&w=2
Patch
Third Party Advisory
Mailing List
http://rt.openssl.org/Ticket/Display.html?id=1930&user=guest&pass=guest
Patch
Third Party Advisory
Broken Link
Mailing List
http://secunia.com/advisories/35128
Third Party Advisory
Vendor Advisory
http://www.securityfocus.com/bid/35001
Third Party Advisory
VDB Entry
http://www.securitytracker.com/id?1022241
Third Party Advisory
VDB Entry
http://www.vupen.com/english/advisories/2009/1377
Third Party Advisory
Permissions Required