CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
AI Score
Confidence
High
EPSS
Percentile
76.3%
USN-5845-1 fixed several vulnerabilities in OpenSSL. This update provides
the corresponding update for Ubuntu 14.04 ESM and Ubuntu 16.04 ESM.
Original advisory details:
David Benjamin discovered that OpenSSL incorrectly handled X.400 address
processing. A remote attacker could possibly use this issue to read
arbitrary memory contents or cause OpenSSL to crash, resulting in a denial
of service. (CVE-2023-0286)
Octavio Galland and Marcel Böhme discovered that OpenSSL incorrectly
handled streaming ASN.1 data. A remote attacker could use this issue to
cause OpenSSL to crash, resulting in a denial of service, or possibly
execute arbitrary code. (CVE-2023-0215)
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
Ubuntu | 16.04 | noarch | libssl1.0.0 | < 1.0.2g-1ubuntu4.20+esm6 | UNKNOWN |
Ubuntu | 16.04 | noarch | libcrypto1.0.0-udeb | < 1.0.2g-1ubuntu4.20 | UNKNOWN |
Ubuntu | 16.04 | noarch | libcrypto1.0.0-udeb-dbgsym | < 1.0.2g-1ubuntu4.20 | UNKNOWN |
Ubuntu | 16.04 | noarch | libssl-dev | < 1.0.2g-1ubuntu4.20 | UNKNOWN |
Ubuntu | 16.04 | noarch | libssl-dev-dbgsym | < 1.0.2g-1ubuntu4.20 | UNKNOWN |
Ubuntu | 16.04 | noarch | libssl-doc | < 1.0.2g-1ubuntu4.20 | UNKNOWN |
Ubuntu | 16.04 | noarch | libssl1.0.0 | < 1.0.2g-1ubuntu4.20 | UNKNOWN |
Ubuntu | 16.04 | noarch | libssl1.0.0-dbg | < 1.0.2g-1ubuntu4.20 | UNKNOWN |
Ubuntu | 16.04 | noarch | libssl1.0.0-dbgsym | < 1.0.2g-1ubuntu4.20 | UNKNOWN |
Ubuntu | 16.04 | noarch | libssl1.0.0-udeb | < 1.0.2g-1ubuntu4.20 | UNKNOWN |