|
Message-ID: <0905180919450.20973@mjc.redhat.com> Date: Mon, 18 May 2009 09:32:04 +0100 (BST) From: Mark J Cox <mjc@...hat.com> To: oss-security@...ts.openwall.com Subject: Two OpenSSL DTLS remote DoS Spotted on openssl-dev, two issues that can lead to a remote attacker exhausting memory of a DTLS enabled service. DTLS support was introduced in OpenSSL 0.9.8. CVE-2009-1377 DTLS epoch record buffer memory DoS http://rt.openssl.org/Ticket/Display.html?id=1930&user=guest&pass=guest http://marc.info/?l=openssl-dev&m=124247675613888&w=2 http://cvs.openssl.org/chngview?cn=18187 CVSSv2= 5.0/AV:N/AC:L/Au:N/C:N/I:N/A:P CVE-2009-1378 DTLS fragment handling memory DoS http://rt.openssl.org/Ticket/Display.html?id=1931&user=guest&pass=guest http://marc.info/?t=124250665500033&r=1&w=2 http://cvs.openssl.org/chngview?cn=18188 (Note doesn't have a backported 0.9.8 patch yet, follow openssl-dev) CVSSv2= 5.0/AV:N/AC:L/Au:N/C:N/I:N/A:P Thanks, Mark
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.