[Forgot Password]
Login  Register Subscribe

23631

 
 

115084

 
 

97559

 
 

909

 
 

78730

 
 

109

Paid content will be excluded from the download.


Download | Alert*
CVE
view XML

CVE-2016-2105

Date: (C)2016-06-02   (M)2017-11-17
 
CVSS Score: 5.0Access Vector: NETWORK
Exploitability Subscore: 10.0Access Complexity: LOW
Impact Subscore: 2.9Authentication: NONE
 Confidentiality: NONE
 Integrity: NONE
 Availability: PARTIAL











Integer overflow in the EVP_EncodeUpdate function in crypto/evp/encode.c in OpenSSL before 1.0.1t and 1.0.2 before 1.0.2h allows remote attackers to cause a denial of service (heap memory corruption) via a large amount of binary data.

Reference:
SECTRACK-1035721
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160504-openssl
BID-89757
BID-91787
APPLE-SA-2016-07-18-1
DSA-3566
FEDORA-2016-05c567df1a
FEDORA-2016-1411324654
FEDORA-2016-1e39d934ed
FreeBSD-SA-16:17
GLSA-201612-16
RHSA-2016:0722
RHSA-2016:0996
RHSA-2016:1648
RHSA-2016:1649
RHSA-2016:1650
SSA:2016-124-01
SUSE-SU-2016:1206
SUSE-SU-2016:1228
SUSE-SU-2016:1231
SUSE-SU-2016:1233
SUSE-SU-2016:1267
SUSE-SU-2016:1290
SUSE-SU-2016:1360
USN-2959-1
http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10759
http://packetstormsecurity.com/files/136912/Slackware-Security-Advisory-openssl-Updates.html
http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html
http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html
http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html
http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html
http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html
http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html
https://bto.bluecoat.com/security-advisory/sa123
https://git.openssl.org/?p=openssl.git;a=commit;h=5b814481f3573fa9677f3a31ee51322e2a22ee6a
https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03756en_us
https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03765en_us
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05320149
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722
https://kc.mcafee.com/corporate/index?page=content&id=SB10160
https://security.netapp.com/advisory/ntap-20160504-0001/
https://source.android.com/security/bulletin/pixel/2017-11-01
https://support.apple.com/HT206903
https://www.openssl.org/news/secadv/20160503.txt
https://www.tenable.com/security/tns-2016-18
openSUSE-SU-2016:1237
openSUSE-SU-2016:1238
openSUSE-SU-2016:1239
openSUSE-SU-2016:1240
openSUSE-SU-2016:1241
openSUSE-SU-2016:1242
openSUSE-SU-2016:1243
openSUSE-SU-2016:1273
openSUSE-SU-2016:1566

CPE    19
cpe:/o:novell:leap:42.1
cpe:/o:novell:opensuse:13.2
cpe:/o:redhat:enterprise_linux_server:6.0
cpe:/o:redhat:enterprise_linux_workstation:6.0
...
CWE    1
CWE-189
OVAL    20
oval:org.secpod.oval:def:400644
oval:org.secpod.oval:def:36326
oval:org.secpod.oval:def:204130
oval:org.secpod.oval:def:1501454
...

© 2013 SecPod Technologies