Lucene search

K
ubuntucveUbuntu.comUB:CVE-2016-2107
HistoryMay 03, 2016 - 12:00 a.m.

CVE-2016-2107

2016-05-0300:00:00
ubuntu.com
ubuntu.com
21

5.9 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N

2.6 Low

CVSS2

Access Vector

NETWORK

Access Complexity

HIGH

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:N/AC:H/Au:N/C:P/I:N/A:N

0.969 High

EPSS

Percentile

99.7%

The AES-NI implementation in OpenSSL before 1.0.1t and 1.0.2 before 1.0.2h
does not consider memory allocation during a certain padding check, which
allows remote attackers to obtain sensitive cleartext information via a
padding-oracle attack against an AES CBC session. NOTE: this vulnerability
exists because of an incorrect fix for CVE-2013-0169.

OSVersionArchitecturePackageVersionFilename
ubuntu17.10noarchopenssl< 1.0.2g-1ubuntu5UNKNOWN
ubuntu18.04noarchopenssl< 1.0.2g-1ubuntu5UNKNOWN
ubuntu18.10noarchopenssl< 1.0.2g-1ubuntu5UNKNOWN
ubuntu19.04noarchopenssl< 1.0.2g-1ubuntu5UNKNOWN
ubuntu12.04noarchopenssl< 1.0.1-4ubuntu5.36UNKNOWN
ubuntu14.04noarchopenssl< 1.0.1f-1ubuntu2.19UNKNOWN
ubuntu15.10noarchopenssl< 1.0.2d-0ubuntu1.5UNKNOWN
ubuntu16.04noarchopenssl< 1.0.2g-1ubuntu4.1UNKNOWN
ubuntu16.10noarchopenssl< 1.0.2g-1ubuntu5UNKNOWN
ubuntu17.04noarchopenssl< 1.0.2g-1ubuntu5UNKNOWN

5.9 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N

2.6 Low

CVSS2

Access Vector

NETWORK

Access Complexity

HIGH

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:N/AC:H/Au:N/C:P/I:N/A:N

0.969 High

EPSS

Percentile

99.7%