Lucene search

K
cveRedhatCVE-2016-2106
HistoryMay 05, 2016 - 1:59 a.m.

CVE-2016-2106

2016-05-0501:59:02
CWE-189
redhat
web.nvd.nist.gov
192
cve
2016
2106
integer overflow
openssl
evp_encryptupdate
denial of service
heap memory corruption
nvd

CVSS2

5

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:N/I:N/A:P

CVSS3

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

AI Score

7.6

Confidence

High

EPSS

0.337

Percentile

97.1%

Integer overflow in the EVP_EncryptUpdate function in crypto/evp/evp_enc.c in OpenSSL before 1.0.1t and 1.0.2 before 1.0.2h allows remote attackers to cause a denial of service (heap memory corruption) via a large amount of data.

Affected configurations

Nvd
Node
opensslopensslRange1.0.1s
OR
opensslopensslMatch1.0.2
OR
opensslopensslMatch1.0.2beta1
OR
opensslopensslMatch1.0.2beta2
OR
opensslopensslMatch1.0.2beta3
OR
opensslopensslMatch1.0.2a
OR
opensslopensslMatch1.0.2b
OR
opensslopensslMatch1.0.2c
OR
opensslopensslMatch1.0.2d
OR
opensslopensslMatch1.0.2e
OR
opensslopensslMatch1.0.2f
OR
opensslopensslMatch1.0.2g
Node
redhatenterprise_linux_desktopMatch7.0
OR
redhatenterprise_linux_hpc_nodeMatch7.0
OR
redhatenterprise_linux_hpc_node_eusMatch7.2
OR
redhatenterprise_linux_serverMatch7.0
OR
redhatenterprise_linux_server_ausMatch7.2
OR
redhatenterprise_linux_server_eusMatch7.2
OR
redhatenterprise_linux_workstationMatch7.0
Node
redhatenterprise_linux_desktopMatch6.0
OR
redhatenterprise_linux_hpc_nodeMatch6.0
OR
redhatenterprise_linux_serverMatch6.0
OR
redhatenterprise_linux_workstationMatch6.0
VendorProductVersionCPE
opensslopenssl*cpe:2.3:a:openssl:openssl:*:*:*:*:*:*:*:*
opensslopenssl1.0.2cpe:2.3:a:openssl:openssl:1.0.2:*:*:*:*:*:*:*
opensslopenssl1.0.2cpe:2.3:a:openssl:openssl:1.0.2:beta1:*:*:*:*:*:*
opensslopenssl1.0.2cpe:2.3:a:openssl:openssl:1.0.2:beta2:*:*:*:*:*:*
opensslopenssl1.0.2cpe:2.3:a:openssl:openssl:1.0.2:beta3:*:*:*:*:*:*
opensslopenssl1.0.2acpe:2.3:a:openssl:openssl:1.0.2a:*:*:*:*:*:*:*
opensslopenssl1.0.2bcpe:2.3:a:openssl:openssl:1.0.2b:*:*:*:*:*:*:*
opensslopenssl1.0.2ccpe:2.3:a:openssl:openssl:1.0.2c:*:*:*:*:*:*:*
opensslopenssl1.0.2dcpe:2.3:a:openssl:openssl:1.0.2d:*:*:*:*:*:*:*
opensslopenssl1.0.2ecpe:2.3:a:openssl:openssl:1.0.2e:*:*:*:*:*:*:*
Rows per page:
1-10 of 231

References

CVSS2

5

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:N/I:N/A:P

CVSS3

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

AI Score

7.6

Confidence

High

EPSS

0.337

Percentile

97.1%