Public exploit available
Public proof-of-concept or exploit code exists (ExploitDB / Metasploit / Nuclei).

CVE-2009-1378Missing Release of Memory after Effective Lifetime in Openssl

Severity
5.0MEDIUMNVD
EPSS
13.2%
top 5.83%
CISA KEV
Not in KEV
Exploit
PoC available
Public exploit / PoC exists
Timeline
PublishedMay 19
Latest updateDec 29

Description

Multiple memory leaks in the dtls1_process_out_of_seq_message function in ssl/d1_both.c in OpenSSL 0.9.8k and earlier 0.9.8 versions allow remote attackers to cause a denial of service (memory consumption) via DTLS records that (1) are duplicates or (2) have sequence numbers much greater than current sequence numbers, aka "DTLS fragment handling memory leak."

CVSS vector

AV:N/AC:L/C:N/I:N/A:PExploitability: 10.0 | Impact: 2.9

Affected Packages3 packages

debiandebian/openssl< openssl 0.9.8k-1 (bookworm)
NVDopenssl/openssl< 0.9.8m
Debianopenssl/openssl< 0.9.8k-1+3

Also affects: Ubuntu Linux 6.06, 8.04, 8.10, 9.04

Patches

🔴Vulnerability Details

2
GHSA
GHSA-v965-8v6m-8c59: Multiple memory leaks in the dtls1_process_out_of_seq_message function in ssl/d1_both2022-05-03
OSV
CVE-2009-1378: Multiple memory leaks in the dtls1_process_out_of_seq_message function in ssl/d1_both2009-05-19

💥Exploits & PoCs

2
Exploit-DB
OpenSSL < 0.9.8i - DTLS ChangeCipherSpec Remote Denial of Service2009-06-04
Exploit-DB
OpenSSL 0.9.8k/1.0.0-beta2 - DTLS Remote Memory Exhaustion Denial of Service2009-05-18

📋Vendor Advisories

3
Ubuntu
OpenSSL vulnerabilities2009-06-25
Red Hat
OpenSSL: DTLS fragment handling memory DoS2009-05-12
Debian
CVE-2009-1378: openssl - Multiple memory leaks in the dtls1_process_out_of_seq_message function in ssl/d1...2009

📄Research Papers

1
arXiv
One Bad Apple Spoils the Barrel: Understanding the Security Risks Introduced by Third-Party Components in IoT Firmware2022-12-29

💬Community

2
Bugzilla
CVE-2014-3505 openssl: DTLS packet processing double free2014-08-07
Bugzilla
CVE-2009-1378 OpenSSL: DTLS fragment handling memory DoS2009-05-18