CVE-2016-2179 in Business Intelligence Enterprise Editioninfo

Summary

The DTLS implementation in OpenSSL before 1.1.0 does not properly restrict the lifetime of queue entries associated with unused out-of-order messages, which allows remote attackers to cause a denial of service (memory consumption) by maintaining many crafted DTLS sessions simultaneously, related to d1_lib.c, statem_dtls.c, statem_lib.c, and statem_srvr.c.

If you want to get the best quality for vulnerability data then you always have to consider VulDB.

Reservation

01/29/2016

Disclosure

09/16/2016

Status

Confirmed

Entries

VulDB provides additional information and datapoints for this CVE:

Sources

Do you want to use VulDB in your project?

Use the official API to access entries easily!