vulnerability
Red Hat JBoss EAP: CVE-2016-6304: Missing Release of Memory after Effective Lifetime
Severity | CVSS | Published | Added | Modified |
---|---|---|---|---|
5 | (AV:N/AC:L/Au:N/C:N/I:N/A:P) | Sep 22, 2016 | Sep 19, 2024 | Jul 2, 2025 |
Severity
5
CVSS
(AV:N/AC:L/Au:N/C:N/I:N/A:P)
Published
Sep 22, 2016
Added
Sep 19, 2024
Modified
Jul 2, 2025
Description
Multiple memory leaks in t1_lib.c in OpenSSL before 1.0.1u, 1.0.2 before 1.0.2i, and 1.1.0 before 1.1.0a allow remote attackers to cause a denial of service (memory consumption) via large OCSP Status Request extensions.. A memory leak flaw was found in the way OpenSSL handled TLS status request extension data during session renegotiation. A remote attacker could cause a TLS server using OpenSSL to consume an excessive amount of memory and, possibly, exit unexpectedly after exhausting all available memory, if it enabled OCSP stapling support.
Solution
red-hat-jboss-eap-upgrade-latest
References
- CWE-401
- CVE-2016-6304
- https://attackerkb.com/topics/CVE-2016-6304
- URL-https://access.redhat.com/security/cve/CVE-2016-6304
- URL-https://bugzilla.redhat.com/show_bug.cgi?id=1377600
- URL-https://www.openssl.org/news/secadv/20160922.txt
- URL-https://access.redhat.com/errata/RHSA-2017:1658
- URL-https://access.redhat.com/errata/RHSA-2017:1659

NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.