Vulnerabilities
Vulnerable Software

Vulnerability Details CVE-2016-2179

The DTLS implementation in OpenSSL before 1.1.0 does not properly restrict the lifetime of queue entries associated with unused out-of-order messages, which allows remote attackers to cause a denial of service (memory consumption) by maintaining many crafted DTLS sessions simultaneously, related to d1_lib.c, statem_dtls.c, statem_lib.c, and statem_srvr.c.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.196
EPSS Ranking 95.1%
CVSS Severity
CVSS v3 Score 7.5
CVSS v2 Score 5.0
References
Products affected by CVE-2016-2179
  • Openssl » Openssl » Version: 1.0.1
    cpe:2.3:a:openssl:openssl:1.0.1
  • Openssl » Openssl » Version: 1.0.1a
    cpe:2.3:a:openssl:openssl:1.0.1a
  • Openssl » Openssl » Version: 1.0.1b
    cpe:2.3:a:openssl:openssl:1.0.1b
  • Openssl » Openssl » Version: 1.0.1c
    cpe:2.3:a:openssl:openssl:1.0.1c
  • Openssl » Openssl » Version: 1.0.1d
    cpe:2.3:a:openssl:openssl:1.0.1d
  • Openssl » Openssl » Version: 1.0.1e
    cpe:2.3:a:openssl:openssl:1.0.1e
  • Openssl » Openssl » Version: 1.0.1f
    cpe:2.3:a:openssl:openssl:1.0.1f
  • Openssl » Openssl » Version: 1.0.1g
    cpe:2.3:a:openssl:openssl:1.0.1g
  • Openssl » Openssl » Version: 1.0.1h
    cpe:2.3:a:openssl:openssl:1.0.1h
  • Openssl » Openssl » Version: 1.0.1i
    cpe:2.3:a:openssl:openssl:1.0.1i
  • Openssl » Openssl » Version: 1.0.1j
    cpe:2.3:a:openssl:openssl:1.0.1j
  • Openssl » Openssl » Version: 1.0.1k
    cpe:2.3:a:openssl:openssl:1.0.1k
  • Openssl » Openssl » Version: 1.0.1l
    cpe:2.3:a:openssl:openssl:1.0.1l
  • Openssl » Openssl » Version: 1.0.1m
    cpe:2.3:a:openssl:openssl:1.0.1m
  • Openssl » Openssl » Version: 1.0.1n
    cpe:2.3:a:openssl:openssl:1.0.1n
  • Openssl » Openssl » Version: 1.0.1o
    cpe:2.3:a:openssl:openssl:1.0.1o
  • Openssl » Openssl » Version: 1.0.1p
    cpe:2.3:a:openssl:openssl:1.0.1p
  • Openssl » Openssl » Version: 1.0.1q
    cpe:2.3:a:openssl:openssl:1.0.1q
  • Openssl » Openssl » Version: 1.0.1r
    cpe:2.3:a:openssl:openssl:1.0.1r
  • Openssl » Openssl » Version: 1.0.1s
    cpe:2.3:a:openssl:openssl:1.0.1s
  • Openssl » Openssl » Version: 1.0.1t
    cpe:2.3:a:openssl:openssl:1.0.1t
  • Openssl » Openssl » Version: 1.0.2
    cpe:2.3:a:openssl:openssl:1.0.2
  • Openssl » Openssl » Version: 1.0.2a
    cpe:2.3:a:openssl:openssl:1.0.2a
  • Openssl » Openssl » Version: 1.0.2b
    cpe:2.3:a:openssl:openssl:1.0.2b
  • Openssl » Openssl » Version: 1.0.2c
    cpe:2.3:a:openssl:openssl:1.0.2c
  • Openssl » Openssl » Version: 1.0.2d
    cpe:2.3:a:openssl:openssl:1.0.2d
  • Openssl » Openssl » Version: 1.0.2e
    cpe:2.3:a:openssl:openssl:1.0.2e
  • Openssl » Openssl » Version: 1.0.2f
    cpe:2.3:a:openssl:openssl:1.0.2f
  • Openssl » Openssl » Version: 1.0.2g
    cpe:2.3:a:openssl:openssl:1.0.2g
  • Openssl » Openssl » Version: 1.0.2h
    cpe:2.3:a:openssl:openssl:1.0.2h
  • Oracle » Linux » Version: 6
    cpe:2.3:o:oracle:linux:6
  • Oracle » Linux » Version: 7
    cpe:2.3:o:oracle:linux:7


Contact Us

Shodan ® - All rights reserved