Lucene search

K
nvd[email protected]NVD:CVE-2016-8610
HistoryNov 13, 2017 - 10:29 p.m.

CVE-2016-8610

2017-11-1322:29:00
CWE-400
web.nvd.nist.gov
4

5 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:N/I:N/A:P

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

7.3 High

AI Score

Confidence

High

0.202 Low

EPSS

Percentile

96.4%

A denial of service flaw was found in OpenSSL 0.9.8, 1.0.1, 1.0.2 through 1.0.2h, and 1.1.0 in the way the TLS/SSL protocol defined processing of ALERT packets during a connection handshake. A remote attacker could use this flaw to make a TLS/SSL server consume an excessive amount of CPU and fail to accept connections from other clients.

Affected configurations

NVD
Node
opensslopensslRange1.0.21.0.2h
OR
opensslopensslMatch0.9.8
OR
opensslopensslMatch1.0.1
OR
opensslopensslMatch1.1.0
Node
debiandebian_linuxMatch8.0
Node
redhatenterprise_linux_desktopMatch6.0
OR
redhatenterprise_linux_desktopMatch7.0
OR
redhatenterprise_linux_serverMatch6.0
OR
redhatenterprise_linux_serverMatch7.0
OR
redhatenterprise_linux_server_ausMatch7.3
OR
redhatenterprise_linux_server_ausMatch7.4
OR
redhatenterprise_linux_server_ausMatch7.6
OR
redhatenterprise_linux_server_eusMatch7.3
OR
redhatenterprise_linux_server_eusMatch7.4
OR
redhatenterprise_linux_server_eusMatch7.5
OR
redhatenterprise_linux_server_eusMatch7.6
OR
redhatenterprise_linux_server_tusMatch7.3
OR
redhatenterprise_linux_server_tusMatch7.6
OR
redhatenterprise_linux_workstationMatch6.0
OR
redhatenterprise_linux_workstationMatch7.0
Node
redhatjboss_enterprise_application_platformMatch6.0.0
OR
redhatjboss_enterprise_application_platformMatch6.4.0
AND
redhatenterprise_linuxMatch6.0
OR
redhatenterprise_linuxMatch7.0
Node
netappcn1610_firmwareMatch-
AND
netappcn1610Match-
Node
netappclustered_data_ontap_antivirus_connectorMatch-
OR
netappdata_ontapMatch-7-mode
OR
netappdata_ontap_edgeMatch-
OR
netappe-series_santricity_os_controllerRange11.011.40
OR
netapphost_agentMatch-
OR
netapponcommand_balanceMatch-
OR
netapponcommand_unified_managerMatch-7-mode
OR
netapponcommand_workflow_automationMatch-
OR
netappontap_select_deployMatch-
OR
netappservice_processorMatch-
OR
netappsmi-s_providerMatch-
OR
netappsnapcenter_serverMatch-
OR
netappsnapdriveMatch-unix
OR
netappstoragegridMatch-
OR
netappstoragegrid_webscaleMatch-
OR
netappclustered_data_ontapMatch-
Node
paloaltonetworkspan-osRange6.1.17
OR
paloaltonetworkspan-osRange7.0.07.0.15
OR
paloaltonetworkspan-osRange7.1.07.1.10
Node
oracleadaptive_access_managerMatch11.1.2.3.0
OR
oracleapplication_testing_suiteMatch13.3.0.1
OR
oraclecommunications_analyticsMatch12.1.1
OR
oraclecommunications_ip_service_activatorMatch7.3.4
OR
oraclecommunications_ip_service_activatorMatch7.4.0
OR
oraclecore_rdbmsMatch11.2.0.4
OR
oraclecore_rdbmsMatch12.1.0.2
OR
oraclecore_rdbmsMatch12.2.0.1
OR
oraclecore_rdbmsMatch18c
OR
oraclecore_rdbmsMatch19c
OR
oracleenterprise_manager_ops_centerMatch12.3.3
OR
oracleenterprise_manager_ops_centerMatch12.4.0
OR
oraclegoldengate_application_adaptersMatch12.3.2.1.0
OR
oraclejd_edwards_enterpriseone_toolsMatch9.2
OR
oraclepeoplesoft_enterprise_peopletoolsMatch8.56
OR
oraclepeoplesoft_enterprise_peopletoolsMatch8.57
OR
oraclepeoplesoft_enterprise_peopletoolsMatch8.58
OR
oracleretail_predictive_application_serverMatch15.0.3
OR
oracleretail_predictive_application_serverMatch16.0.3
OR
oracletimesten_in-memory_databaseRange<18.1.4.1.0
OR
oracleweblogic_serverMatch10.3.6.0.0
OR
oracleweblogic_serverMatch12.1.3.0.0
OR
oracleweblogic_serverMatch12.2.1.3.0
OR
oracleweblogic_serverMatch12.2.1.4.0
Node
fujitsum10-1_firmwareRange<xcp2361
OR
fujitsum10-1_firmwareRangexcp3000xcp3070
AND
fujitsum10-1Match-
Node
fujitsum10-4_firmwareRange<xcp2361
OR
fujitsum10-4_firmwareRangexcp3000xcp3070
AND
fujitsum10-4Match-
Node
fujitsum10-4s_firmwareRange<xcp2361
OR
fujitsum10-4s_firmwareRangexcp3000xcp3070
AND
fujitsum10-4sMatch-
Node
fujitsum12-1_firmwareRange<xcp2361
OR
fujitsum12-1_firmwareRangexcp3000xcp3070
AND
fujitsum12-1Match-
Node
fujitsum12-2_firmwareRange<xcp2361
OR
fujitsum12-2_firmwareRangexcp3000xcp3070
AND
fujitsum12-2Match-
Node
fujitsum12-2s_firmwareRange<xcp2361
OR
fujitsum12-2s_firmwareRangexcp3000xcp3070
AND
fujitsum12-2sMatch-

References

5 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:N/I:N/A:P

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

7.3 High

AI Score

Confidence

High

0.202 Low

EPSS

Percentile

96.4%