FreeBSD -- OpenSSL Remote DoS vulnerability

2016-11-02T00:00:00
ID 0FCD3AF0-A0FE-11E6-B1CF-14DAE9D210B8
Type freebsd
Reporter FreeBSD
Modified 2017-02-22T00:00:00

Description

Problem Description: Due to improper handling of alert packets, OpenSSL would consume an excessive amount of CPU time processing undefined alert messages. Impact: A remote attacker who can initiate handshakes with an OpenSSL based server can cause the server to consume a lot of computation power with very little bandwidth usage, and may be able to use this technique in a leveraged Denial of Service attack.