Risk | Low |
Patch available | YES |
Number of vulnerabilities | 1 |
CVE-ID | CVE-2016-6304 |
CWE-ID | CWE-400 |
Exploitation vector | Network |
Public exploit | N/A |
Vulnerable software Subscribe |
openssl (Alpine package) Operating systems & Components / Operating system package or component |
Vendor | Alpine Linux Development Team |
Security Bulletin
This security bulletin contains one low risk vulnerability.
EUVDB-ID: #VU819
Risk: Low
CVSSv3.1: 6.5 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2016-6304
CWE-ID:
CWE-400 - Resource exhaustion
Exploit availability: No
DescriptionThe vulnerability allows a remote unauthenticated user to cause DoS conditions on the target system.
The weakness is due to insufficient validation of input length. By sending messages with excessive length attackers can cause resource exhaustion that leads to denial of service
Successful exploitation of the vulnerability allows a malicious user to trigger the vulnerable service to deny.
Install update from vendor's website.
Vulnerable software versionsopenssl (Alpine package): 1.0.1-r0 - 1.0.1t-r2
External linkshttp://git.alpinelinux.org/aports/commit/?id=4a8e032821bd6376b9019298b0bea706aa7dd8d4
http://git.alpinelinux.org/aports/commit/?id=c57b41c34309ede6b832e2edc306f6ab14a5d78c
http://git.alpinelinux.org/aports/commit/?id=3e8e66af8eb57c1dc45545c6ad7ad09d2ad1bc8c
http://git.alpinelinux.org/aports/commit/?id=3a3ffbd8e2b0a4b3e1b8fcf62f913a691bb4dae4
http://git.alpinelinux.org/aports/commit/?id=3cd2cd34c2859d94c7cfa8bfd46c5ac71b26893e
http://git.alpinelinux.org/aports/commit/?id=a38f0ddf93adc4fd2f8255cbd1c94ab704b007ac
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.