vulnerability
Pulse Secure Pulse Connect Secure: CVE-2016-2179: September 22 2016 OpenSSL Security Advisory (SA40312)
| Severity | CVSS | Published | Added | Modified |
|---|---|---|---|---|
| 5 | (AV:N/AC:L/Au:N/C:N/I:N/A:P) | Sep 16, 2016 | Oct 28, 2020 | Feb 15, 2024 |
Severity
5
CVSS
(AV:N/AC:L/Au:N/C:N/I:N/A:P)
Published
Sep 16, 2016
Added
Oct 28, 2020
Modified
Feb 15, 2024
Description
The DTLS implementation in OpenSSL before 1.1.0 does not properly restrict the lifetime of queue entries associated with unused out-of-order messages, which allows remote attackers to cause a denial of service (memory consumption) by maintaining many crafted DTLS sessions simultaneously, related to d1_lib.c, statem_dtls.c, statem_lib.c, and statem_srvr.c.
Solutions
pulse-secure-pulse-connect-secure-upgrade-8_1r11pulse-secure-pulse-connect-secure-upgrade-8_1r11_1pulse-secure-pulse-connect-secure-upgrade-8_2r6
NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.