Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2016-2177

Опубликовано: 05 мая 2016
Источник: redhat
CVSS3: 5.9
CVSS2: 2.6
EPSS Средний

Описание

OpenSSL through 1.0.2h incorrectly uses pointer arithmetic for heap-buffer boundary checks, which might allow remote attackers to cause a denial of service (integer overflow and application crash) or possibly have unspecified other impact by leveraging unexpected malloc behavior, related to s3_srvr.c, ssl_sess.c, and t1_lib.c.

Multiple integer overflow flaws were found in the way OpenSSL performed pointer arithmetic. A remote attacker could possibly use these flaws to cause a TLS/SSL server or client using OpenSSL to crash.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 5opensslWill not fix
Red Hat Enterprise Linux 5openssl097aWill not fix
Red Hat Enterprise Linux 6openssl098eWill not fix
Red Hat Enterprise Linux 7openssl098eWill not fix
Red Hat JBoss Enterprise Web Server 1opensslWill not fix
Red Hat JBoss Enterprise Web Server 2opensslWill not fix
Red Hat JBoss Enterprise Web Server 3opensslFix deferred
JBoss Core Services on RHEL 6jbcs-httpd24-httpdFixedRHSA-2017:019325.01.2017
JBoss Core Services on RHEL 6jbcs-httpd24-mod_auth_kerbFixedRHSA-2017:019325.01.2017
JBoss Core Services on RHEL 6jbcs-httpd24-mod_bmxFixedRHSA-2017:019325.01.2017

Показывать по

Дополнительная информация

Статус:

Low
Дефект:
CWE-190
https://bugzilla.redhat.com/show_bug.cgi?id=1341705openssl: Possible integer overflow vulnerabilities in codebase

EPSS

Процентиль: 97%
0.34306
Средний

5.9 Medium

CVSS3

2.6 Low

CVSS2

Связанные уязвимости

CVSS3: 9.8
ubuntu
около 9 лет назад

OpenSSL through 1.0.2h incorrectly uses pointer arithmetic for heap-buffer boundary checks, which might allow remote attackers to cause a denial of service (integer overflow and application crash) or possibly have unspecified other impact by leveraging unexpected malloc behavior, related to s3_srvr.c, ssl_sess.c, and t1_lib.c.

CVSS3: 9.8
nvd
около 9 лет назад

OpenSSL through 1.0.2h incorrectly uses pointer arithmetic for heap-buffer boundary checks, which might allow remote attackers to cause a denial of service (integer overflow and application crash) or possibly have unspecified other impact by leveraging unexpected malloc behavior, related to s3_srvr.c, ssl_sess.c, and t1_lib.c.

CVSS3: 9.8
debian
около 9 лет назад

OpenSSL through 1.0.2h incorrectly uses pointer arithmetic for heap-bu ...

CVSS3: 9.8
github
около 3 лет назад

OpenSSL through 1.0.2h incorrectly uses pointer arithmetic for heap-buffer boundary checks, which might allow remote attackers to cause a denial of service (integer overflow and application crash) or possibly have unspecified other impact by leveraging unexpected malloc behavior, related to s3_srvr.c, ssl_sess.c, and t1_lib.c.

CVSS3: 9.8
fstec
около 9 лет назад

Уязвимость библиотеки OpenSSL, вызванная целочисленным переполнением, позволяющая нарушителю вызвать отказ в обслуживании или, возможно, оказать другое воздействие

EPSS

Процентиль: 97%
0.34306
Средний

5.9 Medium

CVSS3

2.6 Low

CVSS2