vulnerability
OpenSSL DTLS replay protection DoS (CVE-2016-2181)
Severity | CVSS | Published | Added | Modified |
---|---|---|---|---|
5 | (AV:N/AC:L/Au:N/C:N/I:N/A:P) | 2016-09-16 | 2016-09-23 | 2024-11-27 |
Severity
5
CVSS
(AV:N/AC:L/Au:N/C:N/I:N/A:P)
Published
2016-09-16
Added
2016-09-23
Modified
2024-11-27
Description
The Anti-Replay feature in the DTLS implementation in OpenSSL before 1.1.0 mishandles early use of a new epoch number in conjunction with a large sequence number, which allows remote attackers to cause a denial of service (false-positive packet drops) via spoofed DTLS records, related to rec_layer_d1.c and ssl3_record.c.
Solution(s)
http-openssl-1_0_1-upgrade-1_0_1_uhttp-openssl-1_0_2-upgrade-1_0_2_i

NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.