9.8 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9 High
AI Score
Confidence
Low
10 High
CVSS2
Access Vector
NETWORK
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:L/Au:N/C:C/I:C/A:C
0.683 Medium
EPSS
Percentile
97.9%
Yuval Yarom, Daniel Genkin, and Nadia Heninger discovered that OpenSSL was
vulnerable to a side-channel attack on modular exponentiation. On certain
CPUs, a local attacker could possibly use this issue to recover RSA keys.
This flaw is known as CacheBleed. (CVE-2016-0702)
Adam Langley discovered that OpenSSL incorrectly handled memory when
parsing DSA private keys. A remote attacker could use this issue to cause
OpenSSL to crash, resulting in a denial of service, or possibly execute
arbitrary code. (CVE-2016-0705)
Guido Vranken discovered that OpenSSL incorrectly handled hex digit
calculation in the BN_hex2bn function. A remote attacker could use this
issue to cause OpenSSL to crash, resulting in a denial of service, or
possibly execute arbitrary code. (CVE-2016-0797)
Emilia Käsper discovered that OpenSSL incorrectly handled memory when
performing SRP user database lookups. A remote attacker could possibly use
this issue to cause OpenSSL to consume memory, resulting in a denial of
service. (CVE-2016-0798)
Guido Vranken discovered that OpenSSL incorrectly handled memory when
printing very long strings. A remote attacker could use this issue to cause
OpenSSL to crash, resulting in a denial of service, or possibly execute
arbitrary code. (CVE-2016-0799)
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
Ubuntu | 15.10 | noarch | libssl1.0.0 | < 1.0.2d-0ubuntu1.4 | UNKNOWN |
Ubuntu | 15.10 | noarch | libcrypto1.0.0-udeb | < 1.0.2d-0ubuntu1.4 | UNKNOWN |
Ubuntu | 15.10 | noarch | libcrypto1.0.0-udeb-dbgsym | < 1.0.2d-0ubuntu1.4 | UNKNOWN |
Ubuntu | 15.10 | noarch | libssl-dev | < 1.0.2d-0ubuntu1.4 | UNKNOWN |
Ubuntu | 15.10 | noarch | libssl-dev-dbgsym | < 1.0.2d-0ubuntu1.4 | UNKNOWN |
Ubuntu | 15.10 | noarch | libssl-doc | < 1.0.2d-0ubuntu1.4 | UNKNOWN |
Ubuntu | 15.10 | noarch | libssl1.0.0-dbg | < 1.0.2d-0ubuntu1.4 | UNKNOWN |
Ubuntu | 15.10 | noarch | libssl1.0.0-dbgsym | < 1.0.2d-0ubuntu1.4 | UNKNOWN |
Ubuntu | 15.10 | noarch | libssl1.0.0-udeb | < 1.0.2d-0ubuntu1.4 | UNKNOWN |
Ubuntu | 15.10 | noarch | libssl1.0.0-udeb-dbgsym | < 1.0.2d-0ubuntu1.4 | UNKNOWN |
9.8 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9 High
AI Score
Confidence
Low
10 High
CVSS2
Access Vector
NETWORK
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:L/Au:N/C:C/I:C/A:C
0.683 Medium
EPSS
Percentile
97.9%