The X509_NAME_oneline function in crypto/x509/x509_obj.c in OpenSSL before 1.0.1t and 1.0.2 before 1.0.2h allows remote attackers to obtain sensitive information from process stack memory or cause a denial of service (buffer over-read) via crafted EBCDIC ASN.1 data.
http://lists.apple.com/archives/security-announce/2016/Jul/msg00000.html
http://packetstormsecurity.com/files/136912/Slackware-Security-Advisory-openssl-Updates.html
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160504-openssl
http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html
http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html
http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html
http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
http://www.securityfocus.com/bid/89746
http://www.securityfocus.com/bid/91787
http://www.securitytracker.com/id/1035721
http://www.slackware.com/security/viewer.php?l=slackware-security&y=2016&m=slackware-security.542103
https://bto.bluecoat.com/security-advisory/sa123
https://git.openssl.org/?p=openssl.git;a=commit;h=2919516136a4227d9e6d8f2fe66ef976aaf8c561
https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03756en_us
https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03765en_us
https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA40202
https://kc.mcafee.com/corporate/index?page=content&id=SB10160
https://security.gentoo.org/glsa/201612-16
https://security.netapp.com/advisory/ntap-20160504-0001/
https://support.apple.com/HT206903
Source: MITRE
Published: 2016-05-05
Updated: 2018-07-19
Type: CWE-119
Base Score: 6.4
Vector: AV:N/AC:L/Au:N/C:P/I:N/A:P
Impact Score: 4.9
Exploitability Score: 10
Severity: MEDIUM
Base Score: 8.2
Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H
Impact Score: 4.2
Exploitability Score: 3.9
Severity: HIGH
OR
cpe:2.3:a:openssl:openssl:*:*:*:*:*:*:*:* versions up to 1.0.1s (inclusive)
cpe:2.3:a:openssl:openssl:1.0.2:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:1.0.2:beta1:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:1.0.2:beta2:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:1.0.2:beta3:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:1.0.2a:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:1.0.2b:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:1.0.2c:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:1.0.2d:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:1.0.2e:*:*:*:*:*:*:*
ID | Name | Product | Family | Severity |
---|---|---|---|---|
137479 | EulerOS 2.0 SP2 : openssl098e (EulerOS-SA-2020-1637) | Nessus | Huawei Local Security Checks | medium |
106500 | pfSense < 2.3.1 Multiple Vulnerabilities (SA-16_03 / SA-16-04) | Nessus | Firewalls | high |
97893 | Tenable Log Correlation Engine (LCE) < 4.8.1 Multiple Vulnerabilities | Nessus | Misc. | critical |
95602 | GLSA-201612-16 : OpenSSL: Multiple vulnerabilities | Nessus | Gentoo Local Security Checks | critical |
94164 | Oracle E-Business Multiple Vulnerabilities (October 2016 CPU) | Nessus | Misc. | high |
92496 | Mac OS X 10.11.x < 10.11.6 Multiple Vulnerabilities | Nessus | MacOS X Local Security Checks | critical |
92458 | Oracle VM VirtualBox < 5.0.22 Multiple Vulnerabilities (July 2016 CPU) | Nessus | Misc. | medium |
92323 | AIX OpenSSL Advisory : openssl_advisory20.asc | Nessus | AIX Local Security Checks | critical |
92045 | Cisco TelePresence VCS / Expressway 8.x < 8.8 Multiple Vulnerabilities (Bar Mitzvah) | Nessus | CISCO | critical |
9390 | OpenSSL 1.0.1 < 1.0.1t / 1.0.2 < 1.0.2h Multiple Vulnerabilities | Nessus Network Monitor | Web Servers | high |
90891 | OpenSSL 1.0.2 < 1.0.2h Multiple Vulnerabilities | Nessus | Web Servers | medium |
90890 | OpenSSL 1.0.1 < 1.0.1t Multiple Vulnerabilities | Nessus | Web Servers | medium |
90876 | FreeBSD : OpenSSL -- multiple vulnerabilities (01d729ca-1143-11e6-b55e-b499baebfeaf) | Nessus | FreeBSD Local Security Checks | critical |
90874 | Debian DLA-456-1 : openssl security update | Nessus | Debian Local Security Checks | critical |
90863 | Slackware 14.0 / 14.1 / current : openssl (SSA:2016-124-01) | Nessus | Slackware Local Security Checks | critical |