{
  "modified": "2025-08-09T19:01:28Z",
  "published": "2016-01-22T15:59:03Z",
  "id": "CVE-2015-6925",
  "details": "wolfSSL (formerly CyaSSL) before 3.6.8 allows remote attackers to cause a denial of service (resource consumption or traffic amplification) via a crafted DTLS cookie in a ClientHello message.",
  "severity": [
    {
      "type": "CVSS_V3",
      "score": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
    }
  ],
  "references": [
    {
      "type": "ADVISORY",
      "url": "https://wolfssl.com/wolfSSL/Blog/Entries/2015/9/17_Two_Vulnerabilities_Recently_Found%2C_An_Attack_on_RSA_using_CRT_and_DoS_Vulnerability_With_DTLS.html"
    },
    {
      "type": "EVIDENCE",
      "url": "https://github.com/IAIK/wolfSSL-DoS"
    },
    {
      "type": "EVIDENCE",
      "url": "https://wolfssl.com/wolfSSL/Blog/Entries/2015/9/17_Two_Vulnerabilities_Recently_Found%2C_An_Attack_on_RSA_using_CRT_and_DoS_Vulnerability_With_DTLS.html"
    },
    {
      "type": "WEB",
      "url": "http://wolfssl.com/wolfSSL/Docs-wolfssl-changelog.html"
    }
  ]
}
