CVE-2016-2179

Severity
7.5HIGH
EPSS
18.3%
top 4.79%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedSep 16
Latest updateMay 13

Description

The DTLS implementation in OpenSSL before 1.1.0 does not properly restrict the lifetime of queue entries associated with unused out-of-order messages, which allows remote attackers to cause a denial of service (memory consumption) by maintaining many crafted DTLS sessions simultaneously, related to d1_lib.c, statem_dtls.c, statem_lib.c, and statem_srvr.c.

CVSS vector

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:HExploitability: 3.9 | Impact: 3.6

Affected Packages3 packages

Debianopenssl< 1.0.2i-1+3
NVDopenssl/openssl30 versions+29
NVDoracle/linux6, 7+1

🔴Vulnerability Details

3
GHSA
GHSA-jxqp-p5q4-rm6m: The DTLS implementation in OpenSSL before 12022-05-13
CVEList
CVE-2016-2179: The DTLS implementation in OpenSSL before 12016-09-16
OSV
CVE-2016-2179: The DTLS implementation in OpenSSL before 12016-09-16

📋Vendor Advisories

5
Cisco
Multiple Vulnerabilities in OpenSSL Affecting Cisco Products: September 20162016-09-27
BSD
FreeBSD-SA-16:26.openssl: Multiple OpenSSL vulnerabilities2016-09-23
Ubuntu
OpenSSL vulnerabilities2016-09-22
Red Hat
openssl: DTLS memory exhaustion DoS when messages are not removed from fragment buffer2016-06-30
Debian
CVE-2016-2179: openssl - The DTLS implementation in OpenSSL before 1.1.0 does not properly restrict the l...2016

💬Community

4
Bugzilla
CVE-2016-2179 openssl101e: openssl: DoS attack by filling up the queue for future messages [epel-5]2016-08-23
Bugzilla
CVE-2016-2179 openssl: DTLS memory exhaustion DoS when messages are not removed from fragment buffer2016-08-23
Bugzilla
CVE-2016-2179 mingw-openssl: openssl: DoS attack by filling up the queue for future messages [fedora-all]2016-08-23
Bugzilla
CVE-2016-2179 openssl: DoS attack by filling up the queue for future messages [fedora-all]2016-08-23
CVE-2016-2179 (HIGH CVSS 7.5) | The DTLS implementation in OpenSSL | cvebase.io