CVE-2009-1378

medium

Description

Multiple memory leaks in the dtls1_process_out_of_seq_message function in ssl/d1_both.c in OpenSSL 0.9.8k and earlier 0.9.8 versions allow remote attackers to cause a denial of service (memory consumption) via DTLS records that (1) are duplicates or (2) have sequence numbers much greater than current sequence numbers, aka "DTLS fragment handling memory leak."

References

http://www.securityfocus.com/bid/35001

http://marc.info/?l=openssl-dev&m=124263491424212&w=2

https://launchpad.net/bugs/cve/2009-1378

http://secunia.com/advisories/35128

http://www.openwall.com/lists/oss-security/2009/05/18/1

http://marc.info/?l=openssl-dev&m=124247679213944&w=2

http://cvs.openssl.org/chngview?cn=18188

http://rt.openssl.org/Ticket/Display.html?id=1931&user=guest&pass=guest

http://www.mandriva.com/security/advisories?name=MDVSA-2009:120

http://www.vupen.com/english/advisories/2009/1377

http://www.securitytracker.com/id?1022241

http://lists.opensuse.org/opensuse-security-announce/2009-06/msg00003.html

http://secunia.com/advisories/35416

http://secunia.com/advisories/35461

http://www.ubuntu.com/usn/USN-792-1

http://secunia.com/advisories/35571

ftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2009-009.txt.asc

http://secunia.com/advisories/35729

http://voodoo-circle.sourceforge.net/sa/sa-20091012-01.html

http://secunia.com/advisories/37003

http://sourceforge.net/mailarchive/message.php?msg_name=4AD43807.7080105%40users.sourceforge.net

http://security.gentoo.org/glsa/glsa-200912-01.xml

http://secunia.com/advisories/38761

http://slackware.com/security/viewer.php?l=slackware-security&y=2010&m=slackware-security.663049

http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c02029444

http://secunia.com/advisories/38834

http://lists.vmware.com/pipermail/security-announce/2010/000082.html

http://secunia.com/advisories/38794

http://www.vupen.com/english/advisories/2010/0528

https://kb.bluecoat.com/index?page=content&id=SA50

http://secunia.com/advisories/42724

http://secunia.com/advisories/42733

http://www.redhat.com/support/errata/RHSA-2009-1335.html

http://secunia.com/advisories/36533

https://www.exploit-db.com/exploits/8720

https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7229

https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11309

Details

Source: MITRE

Published: 2009-05-19

Updated: 2022-02-02

Type: CWE-401

Risk Information

CVSS v2

Base Score: 5

Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P

Impact Score: 2.9

Exploitability Score: 10

Severity: MEDIUM