CVE-2016-2176

MEDIUM

Description

The X509_NAME_oneline function in crypto/x509/x509_obj.c in OpenSSL before 1.0.1t and 1.0.2 before 1.0.2h allows remote attackers to obtain sensitive information from process stack memory or cause a denial of service (buffer over-read) via crafted EBCDIC ASN.1 data.

References

http://lists.apple.com/archives/security-announce/2016/Jul/msg00000.html

http://packetstormsecurity.com/files/136912/Slackware-Security-Advisory-openssl-Updates.html

http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160504-openssl

http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html

http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html

http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html

http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html

http://www.securityfocus.com/bid/89746

http://www.securityfocus.com/bid/91787

http://www.securitytracker.com/id/1035721

http://www.slackware.com/security/viewer.php?l=slackware-security&y=2016&m=slackware-security.542103

https://bto.bluecoat.com/security-advisory/sa123

https://git.openssl.org/?p=openssl.git;a=commit;h=2919516136a4227d9e6d8f2fe66ef976aaf8c561

https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03756en_us

https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03765en_us

https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA40202

https://kc.mcafee.com/corporate/index?page=content&id=SB10160

https://security.gentoo.org/glsa/201612-16

https://security.netapp.com/advisory/ntap-20160504-0001/

https://support.apple.com/HT206903

https://www.openssl.org/news/secadv/20160503.txt

https://www.tenable.com/security/tns-2016-18

Details

Source: MITRE

Published: 2016-05-05

Updated: 2018-07-19

Type: CWE-119

Risk Information

CVSS v2.0

Base Score: 6.4

Vector: AV:N/AC:L/Au:N/C:P/I:N/A:P

Impact Score: 4.9

Exploitability Score: 10

Severity: MEDIUM

CVSS v3.0

Base Score: 8.2

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H

Impact Score: 4.2

Exploitability Score: 3.9

Severity: HIGH

Tenable Plugins

View all (15 total)

IDNameProductFamilySeverity
137479EulerOS 2.0 SP2 : openssl098e (EulerOS-SA-2020-1637)NessusHuawei Local Security Checks
medium
106500pfSense < 2.3.1 Multiple Vulnerabilities (SA-16_03 / SA-16-04)NessusFirewalls
high
97893Tenable Log Correlation Engine (LCE) < 4.8.1 Multiple VulnerabilitiesNessusMisc.
critical
95602GLSA-201612-16 : OpenSSL: Multiple vulnerabilitiesNessusGentoo Local Security Checks
critical
94164Oracle E-Business Multiple Vulnerabilities (October 2016 CPU)NessusMisc.
high
92496Mac OS X 10.11.x < 10.11.6 Multiple VulnerabilitiesNessusMacOS X Local Security Checks
critical
92458Oracle VM VirtualBox < 5.0.22 Multiple Vulnerabilities (July 2016 CPU)NessusMisc.
medium
92323AIX OpenSSL Advisory : openssl_advisory20.ascNessusAIX Local Security Checks
critical
92045Cisco TelePresence VCS / Expressway 8.x < 8.8 Multiple Vulnerabilities (Bar Mitzvah)NessusCISCO
critical
9390OpenSSL 1.0.1 < 1.0.1t / 1.0.2 < 1.0.2h Multiple VulnerabilitiesNessus Network MonitorWeb Servers
high
90891OpenSSL 1.0.2 < 1.0.2h Multiple VulnerabilitiesNessusWeb Servers
medium
90890OpenSSL 1.0.1 < 1.0.1t Multiple VulnerabilitiesNessusWeb Servers
medium
90876FreeBSD : OpenSSL -- multiple vulnerabilities (01d729ca-1143-11e6-b55e-b499baebfeaf)NessusFreeBSD Local Security Checks
critical
90874Debian DLA-456-1 : openssl security updateNessusDebian Local Security Checks
critical
90863Slackware 14.0 / 14.1 / current : openssl (SSA:2016-124-01)NessusSlackware Local Security Checks
critical