Denial of service in OpenSSL - CVE-2016-8610

 

Denial of service in OpenSSL - CVE-2016-8610

Published: October 24, 2016 / Updated: March 30, 2018


Vulnerability identifier: #VU1083
CSH Severity: Low
CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear
CVE-ID: CVE-2016-8610
CWE-ID: CWE-388
Exploitation vector: Remote access
Exploit availability: No public exploit available
Vendor: OpenSSL Software Foundation
Affected software:
OpenSSL

Detailed vulnerability description

The vulnerability allows a remote unauthenticated user to exhaust memory on the target system.
The weakness is due to improper handling of certain packets by the ssl3_read_bytes() function in 'ssl/s3_pkt.c.
By sending a flood of SSL3_AL_WARNING alerts during the SSL handshake, a remote attacker can consume excessive CPU resources that may lead to OpenSSL library being unavailable.
Successful exploitation of the vulnerability results in denial of service on the vulnerable system.

How to mitigate CVE-2016-8610

Update to version 1.0.2j, 1.1.0b.

Sources