### [CVE-2009-1378](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1378) ![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=%3D%20n%2Fa%20&color=brighgreen) ![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen) ### Description Multiple memory leaks in the dtls1_process_out_of_seq_message function in ssl/d1_both.c in OpenSSL 0.9.8k and earlier 0.9.8 versions allow remote attackers to cause a denial of service (memory consumption) via DTLS records that (1) are duplicates or (2) have sequence numbers much greater than current sequence numbers, aka "DTLS fragment handling memory leak." ### POC #### Reference - http://www.ubuntu.com/usn/USN-792-1 - http://www.ubuntu.com/usn/USN-792-1 - https://www.exploit-db.com/exploits/8720 - https://www.exploit-db.com/exploits/8720 #### Github - https://github.com/ARPSyndicate/cvemon - https://github.com/chnzzh/OpenSSL-CVE-lib