This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
This signature detects attempts to exploit a memory corruption vulnerability in OpenSSL.
OpenSSL is an open-source implementation of the SSL protocol that is used by a number of other projects. It is available for various platforms.
OpenSSL is prone to a remote memory-corruption vulnerability. This issue occurs due to a buffer-overrun when processing invalid DTLS fragments submitted to an OpenSSL DTLS client or server.
Note: This issue affects only applications using OpenSSL as a DTLS client or server.
Attackers can exploit this issue by tricking an unsuspecting user into connecting to a malicious server; other attacks may also be possible.
Successfully exploiting this issue may allow an attacker to execute arbitrary code in the context of the application using the vulnerable library.
The following are vulnerable:
OpenSSL 0.9.8 prior to 0.9.8za
OpenSSL 1.0.0 prior to 1.0.0m
OpenSSL 1.0.1 prior to 1.0.1h
- OpenSSL 0.9.8 prior to 0.9.8za
- OpenSSL 1.0.0 prior to 1.0.0m
- OpenSSL 1.0.1 prior to 1.0.1h