OpenSSL.DTLS.Fragment.Buffer.Overflow

description-logoDescription

This indicates an attack attempt against a Buffer Overflow vulnerability in OpenSSL.
The vulnerability is due to insufficient input validation in the application when handling a crafted DTLS packet. A remote attacker can exploit this to execute arbitrary code within the context of the targeted users.

affected-products-logoAffected Products

OpenSSL 0.9.8
OpenSSL 1.0.0
OpenSSL 1.0.1

Impact logoImpact

System Compromise: Remote attackers can gain control of vulnerable systems.

recomended-action-logoRecommended Actions

Apply the most recent upgrade or patch from the vendor.
http://www.openssl.org/news/secadv_20140605.txt

Telemetry logoTelemetry

Coverage

IPS (Regular DB)
IPS (Extended DB)