Home
Reading
Searching
Subscribe
Sponsors
Statistics
Posting
Contact
Spam
Lists
Links
About
Hosting
Filtering
Features Download
Marketing
Archives
FAQ
Blog
 
Gmane
From: Mark J Cox <mjc-H+wXaHxf7aLQT0dZR+AlfA <at> public.gmane.org>
Subject: Two OpenSSL DTLS remote DoS
Newsgroups: gmane.comp.security.oss.general
Date: Monday 18th May 2009 08:32:04 UTC (over 8 years ago)
Spotted on openssl-dev, two issues that can lead to a remote attacker 
exhausting memory of a DTLS enabled service.  DTLS support was introduced 
in OpenSSL 0.9.8.

CVE-2009-1377 DTLS epoch record buffer memory DoS

 	http://rt.openssl.org/Ticket/Display.html?id=1930&user=guest&pass=guest
         http://marc.info/?l=openssl-dev&m=124247675613888&w=2
         http://cvs.openssl.org/chngview?cn=18187

 	CVSSv2= 5.0/AV:N/AC:L/Au:N/C:N/I:N/A:P

CVE-2009-1378 DTLS fragment handling memory DoS

 	http://rt.openssl.org/Ticket/Display.html?id=1931&user=guest&pass=guest
         http://marc.info/?t=124250665500033&r=1&w=2

 	http://cvs.openssl.org/chngview?cn=18188
 	(Note doesn't have a backported 0.9.8 patch yet, follow openssl-dev)

 	CVSSv2= 5.0/AV:N/AC:L/Au:N/C:N/I:N/A:P

Thanks, Mark
 
CD: 3ms