OpenSSL 1.0.2 < 1.0.2c ASN.1 Encoder Negative Zero Value Handling RCE

Critical Nessus Plugin ID 90889


The remote service is affected by a remote code execution vulnerability.


According to its banner, the remote host is running a version of OpenSSL 1.0.2 prior to 1.0.2c. It is, therefore, affected by a remote code execution vulnerability in the ASN.1 encoder due to an underflow condition that occurs when attempting to encode the value zero represented as a negative integer. An unauthenticated, remote attacker can exploit this to corrupt memory, resulting in the execution of arbitrary code.


Upgrade to OpenSSL version 1.0.2c or later.

See Also

Plugin Details

Severity: Critical

ID: 90889

File Name: openssl_1_0_2c.nasl

Version: 1.8

Type: remote

Family: Web Servers

Published: 2016/05/04

Updated: 2019/11/20

Dependencies: 57323

Risk Information

Risk Factor: Critical

CVSS Score Source: CVE-2016-2108

CVSS v2.0

Base Score: 10

Temporal Score: 7.4

Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C

Temporal Vector: CVSS2#E:U/RL:OF/RC:C

CVSS v3.0

Base Score: 9.8

Temporal Score: 8.5

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Temporal Vector: CVSS:3.0/E:U/RL:O/RC:C

Vulnerability Information

CPE: cpe:/a:openssl:openssl

Required KB Items: openssl/port

Exploit Available: false

Exploit Ease: No known exploits are available

Patch Publication Date: 2015/06/11

Vulnerability Publication Date: 2016/05/03

Reference Information

CVE: CVE-2016-2108

BID: 89752