Double free vulnerability in the dsa_priv_decode function in crypto/dsa/dsa_ameth.c in OpenSSL 1.0.1 before 1.0.1s and 1.0.2 before 1.0.2g allows remote attackers to cause a denial of service (memory corruption) or possibly have unspecified other impact via a malformed DSA private key.
http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10759
http://lists.fedoraproject.org/pipermail/package-announce/2016-March/178358.html
http://lists.fedoraproject.org/pipermail/package-announce/2016-March/178817.html
http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00001.html
http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00002.html
http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00003.html
http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00004.html
http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00005.html
http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00006.html
http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00007.html
http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00009.html
http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00010.html
http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00038.html
http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00053.html
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00019.html
http://marc.info/?l=bugtraq&m=145889460330120&w=2
http://marc.info/?l=bugtraq&m=145983526810210&w=2
http://marc.info/?l=bugtraq&m=146108058503441&w=2
http://openssl.org/news/secadv/20160301.txt
http://rhn.redhat.com/errata/RHSA-2016-2957.html
http://source.android.com/security/bulletin/2016-05-01.html
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160302-openssl
http://www.debian.org/security/2016/dsa-3500
http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html
http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html
http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html
http://www.securityfocus.com/bid/83754
http://www.securityfocus.com/bid/91787
http://www.securitytracker.com/id/1035133
http://www.ubuntu.com/usn/USN-2914-1
https://access.redhat.com/errata/RHSA-2018:2568
https://access.redhat.com/errata/RHSA-2018:2575
https://access.redhat.com/errata/RHSA-2018:2713
https://git.openssl.org/?p=openssl.git;a=commit;h=6c88c71b4e4825c7bc0489306d062d017634eb88
https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03741en_us
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05052990
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05068681
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05086877
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05111017
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05126404
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05131085
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05135617
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05141441
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05150736
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05150800
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05150888
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05158380
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05176716
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05301946
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05376917
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722
https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA40168
https://security.FreeBSD.org/advisories/FreeBSD-SA-16:12.openssl.asc
Source: MITRE
Published: 2016-03-03
Updated: 2019-02-20
Type: NVD-CWE-Other
Base Score: 10
Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C
Impact Score: 10
Exploitability Score: 10
Severity: HIGH
Base Score: 9.8
Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Impact Score: 5.9
Exploitability Score: 3.9
Severity: CRITICAL
OR
cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:* versions from 5.6.0 to 5.6.29 (inclusive)
cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:* versions from 5.7.0 to 5.7.11 (inclusive)
OR
cpe:2.3:a:openssl:openssl:1.0.1:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:1.0.1:beta1:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:1.0.1:beta2:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:1.0.1:beta3:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:1.0.1a:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:1.0.1b:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:1.0.1c:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:1.0.1d:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:1.0.1e:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:1.0.1f:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:1.0.1g:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:1.0.1h:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:1.0.1i:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:1.0.1j:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:1.0.1k:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:1.0.1l:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:1.0.1m:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:1.0.1n:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:1.0.1o:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:1.0.1p:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:1.0.1q:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:1.0.1r:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:1.0.2:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:1.0.2:beta1:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:1.0.2:beta2:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:1.0.2:beta3:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:1.0.2a:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:1.0.2b:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:1.0.2c:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:1.0.2d:*:*:*:*:*:*:*
OR
cpe:2.3:o:google:android:4.0:*:*:*:*:*:*:*
cpe:2.3:o:google:android:4.0.1:*:*:*:*:*:*:*
cpe:2.3:o:google:android:4.0.2:*:*:*:*:*:*:*
cpe:2.3:o:google:android:4.0.3:*:*:*:*:*:*:*
cpe:2.3:o:google:android:4.0.4:*:*:*:*:*:*:*
cpe:2.3:o:google:android:4.1:*:*:*:*:*:*:*
cpe:2.3:o:google:android:4.1.2:*:*:*:*:*:*:*
cpe:2.3:o:google:android:4.2:*:*:*:*:*:*:*
cpe:2.3:o:google:android:4.2.1:*:*:*:*:*:*:*
cpe:2.3:o:google:android:4.2.2:*:*:*:*:*:*:*
cpe:2.3:o:google:android:4.3:*:*:*:*:*:*:*
cpe:2.3:o:google:android:4.3.1:*:*:*:*:*:*:*
cpe:2.3:o:google:android:4.4:*:*:*:*:*:*:*
cpe:2.3:o:google:android:4.4.1:*:*:*:*:*:*:*
cpe:2.3:o:google:android:4.4.2:*:*:*:*:*:*:*
cpe:2.3:o:google:android:4.4.3:*:*:*:*:*:*:*
cpe:2.3:o:google:android:5.0:*:*:*:*:*:*:*
cpe:2.3:o:google:android:5.0.1:*:*:*:*:*:*:*
cpe:2.3:o:google:android:5.1:*:*:*:*:*:*:*
cpe:2.3:o:google:android:5.1.0:*:*:*:*:*:*:*
OR
cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*
OR
ID | Name | Product | Family | Severity |
---|---|---|---|---|
120126 | SUSE SLES15 Security Update : java-1_8_0-ibm (SUSE-SU-2018:3082-1) | Nessus | SuSE Local Security Checks | critical |
118293 | SUSE SLES12 Security Update : java-1_8_0-ibm (SUSE-SU-2018:2839-2) | Nessus | SuSE Local Security Checks | critical |
117700 | SUSE SLES12 Security Update : java-1_8_0-ibm (SUSE-SU-2018:2839-1) | Nessus | SuSE Local Security Checks | critical |
117587 | RHEL 6 : java-1.8.0-ibm (RHSA-2018:2713) | Nessus | Red Hat Local Security Checks | critical |
112178 | RHEL 6 : java-1.8.0-ibm (RHSA-2018:2575) | Nessus | Red Hat Local Security Checks | critical |
112131 | RHEL 7 : java-1.8.0-ibm (RHSA-2018:2568) | Nessus | Red Hat Local Security Checks | critical |
106499 | pfSense < 2.3 Multiple Vulnerabilities (SA-16_01 - SA-16_02) | Nessus | Firewalls | critical |
96316 | Juniper Junos Multiple OpenSSL Vulnerabilities (JSA10759) (SWEET32) | Nessus | Junos Local Security Checks | critical |
94935 | Apple Xcode < 8.1 Node.js Multiple RCE (macOS) | Nessus | MacOS X Local Security Checks | critical |
92921 | FreeBSD : FreeBSD -- Multiple OpenSSL vulnerabilities (7b1a4a27-600a-11e6-a6c3-14dae9d210b8) (DROWN) | Nessus | FreeBSD Local Security Checks | critical |
92185 | Fedora 23 : mingw-openssl (2016-e1234b65a2) | Nessus | Fedora Local Security Checks | critical |
92158 | Fedora 24 : mingw-openssl (2016-c558e58b21) | Nessus | Fedora Local Security Checks | critical |
92116 | Fedora 23 : community-mysql (2016-7c48036d73) | Nessus | Fedora Local Security Checks | critical |
92063 | Fedora 22 : community-mysql (2016-1aaf308de4) | Nessus | Fedora Local Security Checks | critical |
91618 | openSUSE Security Update : nodejs (openSUSE-2016-715) | Nessus | SuSE Local Security Checks | critical |
91277 | openSUSE Security Update : mysql-community-server (openSUSE-2016-607) | Nessus | SuSE Local Security Checks | critical |
91239 | Amazon Linux AMI : mysql56 (ALAS-2016-701) | Nessus | Amazon Linux Local Security Checks | critical |
91222 | HP System Management Homepage Multiple Vulnerabilities (HPSBMU03593) | Nessus | Web Servers | critical |
91154 | OracleVM 3.3 / 3.4 : openssl (OVMSA-2016-0049) (SLOTH) | Nessus | OracleVM Local Security Checks | critical |
90847 | FreeBSD : MySQL -- multiple vulnerabilities (8c2b2f11-0ebe-11e6-b55e-b499baebfeaf) | Nessus | FreeBSD Local Security Checks | critical |
90834 | Oracle MySQL 5.7.x < 5.7.12 Multiple Vulnerabilities (RPM Check) (April 2016 CPU) (July 2016 CPU) (October 2017 CPU) (DROWN) | Nessus | Databases | critical |
90832 | Oracle MySQL 5.6.x < 5.6.30 Multiple Vulnerabilities (April 2016 CPU) (July 2016 CPU) (DROWN) | Nessus | Databases | critical |
90705 | Splunk Enterprise < 5.0.15 / 6.0.11 / 6.1.10 / 6.2.9 / 6.3.3.4 or Splunk Light < 6.2.9 / 6.3.3.4 Multiple Vulnerabilities (DROWN) | Nessus | CGI abuses | critical |
90684 | MySQL 5.7.x < 5.7.12 Multiple Vulnerabilities (DROWN) | Nessus | Databases | critical |
90683 | MySQL 5.6.x < 5.6.30 Multiple Vulnerabilities (DROWN) | Nessus | Databases | critical |
90448 | AIX OpenSSL Advisory : openssl_advisory18.asc / openssl_advisory19.asc (DROWN) | Nessus | AIX Local Security Checks | critical |
90161 | F5 Networks BIG-IP : OpenSSL vulnerability (K93122894) | Nessus | F5 Networks Local Security Checks | critical |
90053 | GLSA-201603-15 : OpenSSL: Multiple vulnerabilities (DROWN) | Nessus | Gentoo Local Security Checks | critical |
89927 | FreeBSD : node -- multiple vulnerabilities (6d33b3e5-ea03-11e5-85be-14dae9d210b8) | Nessus | FreeBSD Local Security Checks | critical |
89892 | Fedora 22 : openssl-1.0.1k-14.fc22 (2016-e6807b3394) | Nessus | Fedora Local Security Checks | critical |
89842 | Amazon Linux AMI : openssl (ALAS-2016-661) (DROWN) (SLOTH) | Nessus | Amazon Linux Local Security Checks | critical |
89819 | RHEL 6 : rhev-hypervisor (RHSA-2016:0379) (DROWN) | Nessus | Red Hat Local Security Checks | critical |
89722 | SUSE SLED11 Security Update : compat-openssl097g (SUSE-SU-2016:0631-1) (DROWN) | Nessus | SuSE Local Security Checks | critical |
801963 | OpenSSL 1.0.1 < 1.0.1s / 1.0.2 < 1.0.2g Multiple Vulnerabilities (DROWN) | Log Correlation Engine | Web Servers | medium |
89655 | SUSE SLED11 / SLES11 Security Update : openssl (SUSE-SU-2016:0624-1) (DROWN) | Nessus | SuSE Local Security Checks | critical |
89499 | Fedora 23 : openssl-1.0.2g-2.fc23 (2016-2802690366) | Nessus | Fedora Local Security Checks | critical |
89092 | openSUSE Security Update : openssl (openSUSE-2016-292) (DROWN) | Nessus | SuSE Local Security Checks | critical |
89091 | openSUSE Security Update : openssl (openSUSE-2016-289) (DROWN) | Nessus | SuSE Local Security Checks | critical |
89090 | openSUSE Security Update : openssl (openSUSE-2016-288) (DROWN) | Nessus | SuSE Local Security Checks | critical |
89085 | Slackware 13.0 / 13.1 / 13.37 / 14.0 / 14.1 / current : openssl (SSA:2016-062-02) (DROWN) | Nessus | Slackware Local Security Checks | critical |
89082 | OpenSSL 1.0.2 < 1.0.2g Multiple Vulnerabilities (DROWN) | Nessus | Web Servers | critical |
89081 | OpenSSL 1.0.1 < 1.0.1s Multiple Vulnerabilities (DROWN) | Nessus | Web Servers | critical |
89078 | Ubuntu 12.04 LTS / 14.04 LTS / 15.10 : openssl vulnerabilities (USN-2914-1) | Nessus | Ubuntu Local Security Checks | critical |
89077 | SUSE SLED12 / SLES12 Security Update : openssl (SUSE-SU-2016:0620-1) (DROWN) | Nessus | SuSE Local Security Checks | critical |
89076 | SUSE SLED12 / SLES12 Security Update : openssl (SUSE-SU-2016:0617-1) (DROWN) | Nessus | SuSE Local Security Checks | critical |
89075 | Scientific Linux Security Update : openssl on SL6.x, SL7.x i386/x86_64 (20160301) (DROWN) | Nessus | Scientific Linux Local Security Checks | critical |
89067 | RHEL 6 / 7 : openssl (RHSA-2016:0301) (DROWN) | Nessus | Red Hat Local Security Checks | critical |
89066 | OracleVM 3.3 : openssl (OVMSA-2016-0031) | Nessus | OracleVM Local Security Checks | critical |
89064 | Oracle Linux 6 / 7 : openssl (ELSA-2016-0301) (DROWN) | Nessus | Oracle Linux Local Security Checks | critical |
89061 | Debian DSA-3500-1 : openssl - security update | Nessus | Debian Local Security Checks | critical |
89059 | CentOS 6 / 7 : openssl (CESA-2016:0301) (DROWN) | Nessus | CentOS Local Security Checks | critical |
9128 | OpenSSL 1.0.1 < 1.0.1s / 1.0.2 < 1.0.2g Multiple Vulnerabilities (DROWN) | Nessus Network Monitor | Web Servers | medium |