OpenSSL DTLS IE Fragment DoS Vulnerability (Transient)
CVE-2023-33084 Published on March 4, 2024
Improper Release of Memory Before Removing Last Reference in Data Modem
Transient DOS while processing IE fragments from server during DTLS handshake.
Vulnerability Analysis
CVE-2023-33084 is exploitable with network access, and does not require authorization privileges or user interaction. This vulnerability is considered to have a low attack complexity. The potential impact of an exploit of this vulnerability is considered to have no impact on confidentiality and integrity, and a high impact on availability.
Weakness Type
What is a Memory Leak Vulnerability?
The software does not sufficiently track and release allocated memory after it has been used, which slowly consumes remaining memory. This is often triggered by improper handling of malformed data or unexpectedly interrupted sessions. In some languages, developers are responsible for tracking memory allocation and releasing the memory. If there are no more pointers or references to the memory, then it can no longer be tracked and identified for release.
CVE-2023-33084 has been classified to as a Memory Leak vulnerability or weakness.
Products Associated with CVE-2023-33084
You can be notified by email with stack.watch whenever vulnerabilities like CVE-2023-33084 are published in these products:
Affected Versions
Qualcomm, Inc. Snapdragon:- Version AR8035 is affected.
- Version FastConnect 6700 is affected.
- Version FastConnect 6900 is affected.
- Version FastConnect 7800 is affected.
- Version QCA6584AU is affected.
- Version QCA6698AQ is affected.
- Version QCA8081 is affected.
- Version QCA8337 is affected.
- Version QCC710 is affected.
- Version QCM4490 is affected.
- Version QCM8550 is affected.
- Version QCN6024 is affected.
- Version QCN6224 is affected.
- Version QCN6274 is affected.
- Version QCN9024 is affected.
- Version QCS4490 is affected.
- Version QFW7114 is affected.
- Version QFW7124 is affected.
- Version SM8550P is affected.
- Version Snapdragon 4 Gen 2 Mobile Platform is affected.
- Version Snapdragon 8 Gen 2 Mobile Platform is affected.
- Version Snapdragon 8 Gen 3 Mobile Platform is affected.
- Version Snapdragon 8+ Gen 2 Mobile Platform is affected.
- Version Snapdragon Auto 5G Modem-RF Gen 2 is affected.
- Version Snapdragon X65 5G Modem-RF System is affected.
- Version Snapdragon X75 5G Modem-RF System is affected.
- Version WCD9340 is affected.
- Version WCD9370 is affected.
- Version WCD9380 is affected.
- Version WCD9385 is affected.
- Version WCD9390 is affected.
- Version WCD9395 is affected.
- Version WCN3950 is affected.
- Version WCN3988 is affected.
- Version WSA8810 is affected.
- Version WSA8815 is affected.
- Version WSA8830 is affected.
- Version WSA8832 is affected.
- Version WSA8835 is affected.
- Version WSA8840 is affected.
- Version WSA8845 is affected.
- Version WSA8845H is affected.
- Before and including * is affected.
- Before and including * is affected.
- Before and including * is affected.
- Before and including * is affected.
- Before and including * is affected.
- Before and including * is affected.
- Before and including * is affected.
- Before and including * is affected.
- Before and including * is affected.
- Before and including * is affected.
- Before and including * is affected.
- Before and including * is affected.
- Before and including * is affected.
- Before and including * is affected.
- Before and including * is affected.
- Before and including * is affected.
- Before and including * is affected.
- Before and including * is affected.
- Before and including * is affected.
- Before and including * is affected.
- Before and including * is affected.
- Before and including * is affected.
- Before and including * is affected.
- Before and including * is affected.
- Before and including * is affected.
- Before and including * is affected.
- Before and including * is affected.
- Before and including * is affected.
- Before and including * is affected.
- Before and including * is affected.
- Before and including * is affected.
- Before and including * is affected.
- Before and including * is affected.
- Before and including * is affected.
- Before and including * is affected.
- Before and including * is affected.
- Before and including * is affected.
- Before and including * is affected.
- Before and including * is affected.
- Before and including * is affected.
- Before and including * is affected.
Exploit Probability
EPSS (Exploit Prediction Scoring System) scores estimate the probability that a vulnerability will be exploited in the wild within the next 30 days. The percentile shows you how this score compares to all other vulnerabilities.