CVE-2016-2105

high
New! CVE Severity Now Using CVSS v3

The calculated severity for CVEs has been updated to use CVSS v3 by default. CVEs that do not have a CVSS v3 score will fall back CVSS v2 for calculating severity. Severity display preferences can be toggled in the settings dropdown.

Description

Integer overflow in the EVP_EncodeUpdate function in crypto/evp/encode.c in OpenSSL before 1.0.1t and 1.0.2 before 1.0.2h allows remote attackers to cause a denial of service (heap memory corruption) via a large amount of binary data.

References

http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10759

http://lists.apple.com/archives/security-announce/2016/Jul/msg00000.html

http://lists.fedoraproject.org/pipermail/package-announce/2016-May/183457.html

http://lists.fedoraproject.org/pipermail/package-announce/2016-May/183607.html

http://lists.fedoraproject.org/pipermail/package-announce/2016-May/184605.html

http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00001.html

http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00008.html

http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00010.html

http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00011.html

http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00013.html

http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00014.html

http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00015.html

http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00016.html

http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00017.html

http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00018.html

http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00019.html

http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00029.html

http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00030.html

http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00036.html

http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00055.html

http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00019.html

http://packetstormsecurity.com/files/136912/Slackware-Security-Advisory-openssl-Updates.html

http://rhn.redhat.com/errata/RHSA-2016-0722.html

http://rhn.redhat.com/errata/RHSA-2016-0996.html

http://rhn.redhat.com/errata/RHSA-2016-1648.html

http://rhn.redhat.com/errata/RHSA-2016-1649.html

http://rhn.redhat.com/errata/RHSA-2016-1650.html

http://rhn.redhat.com/errata/RHSA-2016-2056.html

http://rhn.redhat.com/errata/RHSA-2016-2073.html

http://rhn.redhat.com/errata/RHSA-2016-2957.html

http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160504-openssl

http://www.debian.org/security/2016/dsa-3566

http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html

http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html

http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html

http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html

http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html

http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html

http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html

http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html

http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html

http://www.securityfocus.com/bid/89757

http://www.securityfocus.com/bid/91787

http://www.securitytracker.com/id/1035721

http://www.slackware.com/security/viewer.php?l=slackware-security&y=2016&m=slackware-security.542103

http://www.ubuntu.com/usn/USN-2959-1

https://bto.bluecoat.com/security-advisory/sa123

https://git.openssl.org/?p=openssl.git;a=commit;h=5b814481f3573fa9677f3a31ee51322e2a22ee6a

https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03756en_us

https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03765en_us

https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05320149

https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722

https://kc.mcafee.com/corporate/index?page=content&id=SB10160

https://security.gentoo.org/glsa/201612-16

https://security.netapp.com/advisory/ntap-20160504-0001/

https://source.android.com/security/bulletin/pixel/2017-11-01

https://support.apple.com/HT206903

https://www.freebsd.org/security/advisories/FreeBSD-SA-16:17.openssl.asc

https://www.openssl.org/news/secadv/20160503.txt

https://www.tenable.com/security/tns-2016-18

Details

Source: MITRE

Published: 2016-05-05

Updated: 2019-02-21

Type: CWE-189

Risk Information

CVSS v2

Base Score: 5

Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P

Impact Score: 2.9

Exploitability Score: 10

Severity: MEDIUM

CVSS v3

Base Score: 7.5

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

Impact Score: 3.6

Exploitability Score: 3.9

Severity: HIGH

Vulnerable Software

Configuration 1

OR

cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*

cpe:2.3:o:redhat:enterprise_linux_hpc_node:6:*:*:*:*:*:*:*

cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*

cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*

Configuration 2

OR

cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*

cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*

Configuration 3

OR

cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:* versions from 5.6.0 to 5.6.30 (inclusive)

cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:* versions from 5.7.0 to 5.7.12 (inclusive)

Configuration 4

OR

cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*

cpe:2.3:o:redhat:enterprise_linux_hpc_node:7.0:*:*:*:*:*:*:*

cpe:2.3:o:redhat:enterprise_linux_hpc_node_eus:7.2:*:*:*:*:*:*:*

cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*

cpe:2.3:o:redhat:enterprise_linux_server_aus:7.2:*:*:*:*:*:*:*

cpe:2.3:o:redhat:enterprise_linux_server_eus:7.2:*:*:*:*:*:*:*

cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*

Configuration 5

OR

cpe:2.3:o:apple:mac_os_x:10.11.5:*:*:*:*:*:*:*

Configuration 6

OR

cpe:2.3:a:openssl:openssl:1.0.1:*:*:*:*:*:*:*

cpe:2.3:a:openssl:openssl:1.0.1:beta1:*:*:*:*:*:*

cpe:2.3:a:openssl:openssl:1.0.1:beta2:*:*:*:*:*:*

cpe:2.3:a:openssl:openssl:1.0.1:beta3:*:*:*:*:*:*

cpe:2.3:a:openssl:openssl:1.0.1a:*:*:*:*:*:*:*

cpe:2.3:a:openssl:openssl:1.0.1b:*:*:*:*:*:*:*

cpe:2.3:a:openssl:openssl:1.0.1c:*:*:*:*:*:*:*

cpe:2.3:a:openssl:openssl:1.0.1d:*:*:*:*:*:*:*

cpe:2.3:a:openssl:openssl:1.0.1e:*:*:*:*:*:*:*

cpe:2.3:a:openssl:openssl:1.0.1f:*:*:*:*:*:*:*

cpe:2.3:a:openssl:openssl:1.0.1g:*:*:*:*:*:*:*

cpe:2.3:a:openssl:openssl:1.0.1h:*:*:*:*:*:*:*

cpe:2.3:a:openssl:openssl:1.0.1i:*:*:*:*:*:*:*

cpe:2.3:a:openssl:openssl:1.0.1j:*:*:*:*:*:*:*

cpe:2.3:a:openssl:openssl:1.0.1k:*:*:*:*:*:*:*

cpe:2.3:a:openssl:openssl:1.0.1l:*:*:*:*:*:*:*

cpe:2.3:a:openssl:openssl:1.0.1m:*:*:*:*:*:*:*

cpe:2.3:a:openssl:openssl:1.0.1n:*:*:*:*:*:*:*

cpe:2.3:a:openssl:openssl:1.0.1o:*:*:*:*:*:*:*

cpe:2.3:a:openssl:openssl:1.0.1p:*:*:*:*:*:*:*

cpe:2.3:a:openssl:openssl:1.0.1q:*:*:*:*:*:*:*

cpe:2.3:a:openssl:openssl:1.0.1r:*:*:*:*:*:*:*

cpe:2.3:a:openssl:openssl:1.0.1s:*:*:*:*:*:*:*

cpe:2.3:a:openssl:openssl:1.0.2:*:*:*:*:*:*:*

cpe:2.3:a:openssl:openssl:1.0.2:beta1:*:*:*:*:*:*

cpe:2.3:a:openssl:openssl:1.0.2:beta2:*:*:*:*:*:*

cpe:2.3:a:openssl:openssl:1.0.2:beta3:*:*:*:*:*:*

cpe:2.3:a:openssl:openssl:1.0.2a:*:*:*:*:*:*:*

cpe:2.3:a:openssl:openssl:1.0.2b:*:*:*:*:*:*:*

cpe:2.3:a:openssl:openssl:1.0.2c:*:*:*:*:*:*:*

cpe:2.3:a:openssl:openssl:1.0.2d:*:*:*:*:*:*:*

cpe:2.3:a:openssl:openssl:1.0.2e:*:*:*:*:*:*:*

cpe:2.3:a:openssl:openssl:1.0.2f:*:*:*:*:*:*:*

cpe:2.3:a:openssl:openssl:1.0.2g:*:*:*:*:*:*:*

Configuration 7

OR

cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*

Configuration 8

OR

cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*

cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*

cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*

cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*

Tenable Plugins

View all (63 total)

IDNameProductFamilySeverity
130679EulerOS 2.0 SP5 : openssl098e (EulerOS-SA-2019-2217)NessusHuawei Local Security Checks
critical
128913EulerOS 2.0 SP2 : openssl098e (EulerOS-SA-2019-1861)NessusHuawei Local Security Checks
critical
106500pfSense < 2.3.1 Multiple Vulnerabilities (SA-16_03 / SA-16-04)NessusFirewalls
high
97893Tenable Log Correlation Engine (LCE) < 4.8.1 Multiple VulnerabilitiesNessusMisc.
critical
96316Juniper Junos Multiple OpenSSL Vulnerabilities (JSA10759) (SWEET32)NessusJunos Local Security Checks
critical
95602GLSA-201612-16 : OpenSSL: Multiple vulnerabilitiesNessusGentoo Local Security Checks
critical
94766F5 Networks BIG-IP : OpenSSL vulnerability (K51920288)NessusF5 Networks Local Security Checks
high
94756openSUSE Security Update : mysql-community-server (openSUSE-2016-1289)NessusSuSE Local Security Checks
critical
94694openSUSE Security Update : mysql-community-server (openSUSE-2016-1283)NessusSuSE Local Security Checks
critical
94679Juniper ScreenOS 6.3.x < 6.3.0r23 Multiple Vulnerabilities in OpenSSL (JSA10759) (DROWN)NessusFirewalls
critical
94654HP System Management Homepage < 7.6 Multiple Vulnerabilities (HPSBMU03653) (httpoxy)NessusWeb Servers
high
94164Oracle E-Business Multiple Vulnerabilities (October 2016 CPU)NessusMisc.
high
94105RHEL 6 : openssl (RHSA-2016:2073)NessusRed Hat Local Security Checks
critical
93761OracleVM 3.3 / 3.4 : openssl (OVMSA-2016-0135)NessusOracleVM Local Security Checks
critical
93119RHEL 6 : JBoss Web Server (RHSA-2016:1649) (httpoxy)NessusRed Hat Local Security Checks
high
93118RHEL 7 : JBoss Web Server (RHSA-2016:1648) (httpoxy)NessusRed Hat Local Security Checks
high
92543Oracle Secure Global Desktop Multiple Vulnerabilities (July 2016 CPU)NessusMisc.
critical
92505FreeBSD : MySQL -- Multiple vulnerabilities (ca5cb202-4f51-11e6-b2ec-b499baebfeaf)NessusFreeBSD Local Security Checks
high
92496Mac OS X 10.11.x < 10.11.6 Multiple VulnerabilitiesNessusMacOS X Local Security Checks
critical
92458Oracle VM VirtualBox < 5.0.22 Multiple Vulnerabilities (July 2016 CPU)NessusMisc.
high
91997MySQL 5.7.x < 5.7.13 Multiple VulnerabilitiesNessusDatabases
low
91995MySQL 5.6.x < 5.6.31 Multiple VulnerabilitiesNessusDatabases
high
92323AIX OpenSSL Advisory : openssl_advisory20.ascNessusAIX Local Security Checks
critical
92185Fedora 23 : mingw-openssl (2016-e1234b65a2)NessusFedora Local Security Checks
critical
92158Fedora 24 : mingw-openssl (2016-c558e58b21)NessusFedora Local Security Checks
critical
92045Cisco TelePresence VCS / Expressway 8.x < 8.8 Multiple Vulnerabilities (Bar Mitzvah)NessusCISCO
critical
91998Oracle MySQL 5.7.x < 5.7.13 Multiple VulnerabilitiesNessusDatabases
low
91996Oracle MySQL 5.6.x < 5.6.31 Multiple VulnerabilitiesNessusDatabases
high
9390OpenSSL 1.0.1 < 1.0.1t / 1.0.2 < 1.0.2h Multiple VulnerabilitiesNessus Network MonitorWeb Servers
high
91777OracleVM 3.2 : openssl (OVMSA-2016-0086)NessusOracleVM Local Security Checks
critical
91738Oracle Linux 5 : openssl (ELSA-2016-3576)NessusOracle Linux Local Security Checks
critical
91618openSUSE Security Update : nodejs (openSUSE-2016-715)NessusSuSE Local Security Checks
critical
91541Scientific Linux Security Update : openssl on SL6.x i386/x86_64 (20160510)NessusScientific Linux Local Security Checks
critical
91282SUSE SLES10 Security Update : openssl (SUSE-SU-2016:1360-1)NessusSuSE Local Security Checks
critical
91171CentOS 6 : openssl (CESA-2016:0996)NessusCentOS Local Security Checks
critical
91158SUSE SLES11 Security Update : openssl (SUSE-SU-2016:1290-1)NessusSuSE Local Security Checks
critical
91154OracleVM 3.3 / 3.4 : openssl (OVMSA-2016-0049) (SLOTH)NessusOracleVM Local Security Checks
critical
91152Oracle Linux 6 : openssl (ELSA-2016-0996)NessusOracle Linux Local Security Checks
critical
91070openSUSE Security Update : compat-openssl098 (openSUSE-2016-575)NessusSuSE Local Security Checks
critical
91068openSUSE Security Update : libopenssl0_9_8 (openSUSE-2016-563) (DROWN)NessusSuSE Local Security Checks
critical
91067openSUSE Security Update : openssl (openSUSE-2016-562)NessusSuSE Local Security Checks
critical
91058Fedora 22 : openssl-1.0.1k-15.fc22 (2016-1e39d934ed)NessusFedora Local Security Checks
critical
91043SUSE SLED12 / SLES12 Security Update : compat-openssl098 (SUSE-SU-2016:1267-1)NessusSuSE Local Security Checks
critical
91041Scientific Linux Security Update : openssl on SL7.x x86_64 (20160509)NessusScientific Linux Local Security Checks
critical
91037RHEL 6 : openssl (RHSA-2016:0996)NessusRed Hat Local Security Checks
critical
91033RHEL 7 : openssl (RHSA-2016:0722)NessusRed Hat Local Security Checks
critical
91029Oracle Linux 7 : openssl (ELSA-2016-0722)NessusOracle Linux Local Security Checks
critical
91017CentOS 7 : openssl (CESA-2016:0722)NessusCentOS Local Security Checks
critical
90949Fedora 24 : openssl-1.0.2h-1.fc24 (2016-1411324654)NessusFedora Local Security Checks
critical
90935openSUSE Security Update : libopenssl0_9_8 (openSUSE-2016-565)NessusSuSE Local Security Checks
critical
90934openSUSE Security Update : openssl (openSUSE-2016-564)NessusSuSE Local Security Checks
critical
90933openSUSE Security Update : openssl (openSUSE-2016-561)NessusSuSE Local Security Checks
critical
90914SUSE SLED12 / SLES12 Security Update : openssl (SUSE-SU-2016:1233-1)NessusSuSE Local Security Checks
critical
90913SUSE SLED12 / SLES12 Security Update : openssl (SUSE-SU-2016:1228-1)NessusSuSE Local Security Checks
critical
90898Fedora 23 : openssl-1.0.2h-1.fc23 (2016-05c567df1a)NessusFedora Local Security Checks
critical
90896Debian DSA-3566-1 : openssl - security updateNessusDebian Local Security Checks
critical
90891OpenSSL 1.0.2 < 1.0.2h Multiple VulnerabilitiesNessusWeb Servers
high
90890OpenSSL 1.0.1 < 1.0.1t Multiple VulnerabilitiesNessusWeb Servers
high
90887Ubuntu 12.04 LTS / 14.04 LTS / 15.10 / 16.04 LTS : openssl vulnerabilities (USN-2959-1)NessusUbuntu Local Security Checks
critical
90876FreeBSD : OpenSSL -- multiple vulnerabilities (01d729ca-1143-11e6-b55e-b499baebfeaf)NessusFreeBSD Local Security Checks
critical
90874Debian DLA-456-1 : openssl security updateNessusDebian Local Security Checks
critical
90864Amazon Linux AMI : openssl (ALAS-2016-695)NessusAmazon Linux Local Security Checks
critical
90863Slackware 14.0 / 14.1 / current : openssl (SSA:2016-124-01)NessusSlackware Local Security Checks
critical