Vulnerability & Exploit Database

Displaying entries 1 - 10 of 60 in total

Results for: CVE-2016-1658 Back to search

IBM AIX: openssl_advisory22 (CVE-2016-8610): Vulnerabilities in OpenSSL affects AIX Vulnerability

  • Severity: 5
  • Published: November 13, 2017

A denial of service flaw was found in OpenSSL 0.9.8, 1.0.1, 1.0.2 through 1.0.2h, and 1.1.0 in the way the TLS/SSL protocol defined processing of ALERT packets during a connection handshake. A remote attacker could use this flaw to make a TLS/SSL server consume an excessive amount of CPU and fail to accept connections from other clients....

Huawei EulerOS: CVE-2016-8610: gnutls security update Vulnerability

  • Severity: 5
  • Published: November 13, 2017

A denial of service flaw was found in OpenSSL 0.9.8, 1.0.1, 1.0.2 through 1.0.2h, and 1.1.0 in the way the TLS/SSL protocol defined processing of ALERT packets during a connection handshake. A remote attacker could use this flaw to make a TLS/SSL server consume an excessive amount of CPU and fail to accept connections from other clients....

Huawei EulerOS: CVE-2016-8610: gnutls security update Vulnerability

  • Severity: 5
  • Published: November 13, 2017

A denial of service flaw was found in OpenSSL 0.9.8, 1.0.1, 1.0.2 through 1.0.2h, and 1.1.0 in the way the TLS/SSL protocol defined processing of ALERT packets during a connection handshake. A remote attacker could use this flaw to make a TLS/SSL server consume an excessive amount of CPU and fail to accept connections from other clients....

Oracle Solaris 11: CVE-2016-8610: Vulnerability in OpenSSL Vulnerability

  • Severity: 5
  • Published: May 29, 2017

A denial of service flaw was found in OpenSSL 0.9.8, 1.0.1, 1.0.2 through 1.0.2h, and 1.1.0 in the way the TLS/SSL protocol defined processing of ALERT packets during a connection handshake. A remote attacker could use this flaw to make a TLS/SSL server consume an excessive amount of CPU and fail to accept connections from other clients....

Ubuntu: (Multiple Advisories) (CVE-2016-8610): GnuTLS vulnerability Vulnerability

  • Severity: 5
  • Published: November 02, 2016

A denial of service flaw was found in OpenSSL 0.9.8, 1.0.1, 1.0.2 through 1.0.2h, and 1.1.0 in the way the TLS/SSL protocol defined processing of ALERT packets during a connection handshake. A remote attacker could use this flaw to make a TLS/SSL server consume an excessive amount of CPU and fail to accept connections from other clients....

SUSE: CVE-2016-8610: SUSE Linux Security Advisory Vulnerability

  • Severity: 5
  • Published: November 02, 2016

A denial of service flaw was found in OpenSSL 0.9.8, 1.0.1, 1.0.2 through 1.0.2h, and 1.1.0 in the way the TLS/SSL protocol defined processing of ALERT packets during a connection handshake. A remote attacker could use this flaw to make a TLS/SSL server consume an excessive amount of CPU and fail to accept connections from other clients....

Red Hat: CVE-2016-8610: Moderate: openssl security update (Multiple Advisories) Vulnerability

  • Severity: 5
  • Published: November 02, 2016

A denial of service flaw was found in OpenSSL 0.9.8, 1.0.1, 1.0.2 through 1.0.2h, and 1.1.0 in the way the TLS/SSL protocol defined processing of ALERT packets during a connection handshake. A remote attacker could use this flaw to make a TLS/SSL server consume an excessive amount of CPU and fail to accept connections from other clients....

Oracle Linux: (CVE-2016-8610) (Multiple Advisories): gnutls security, bug fix, and enhancement update Vulnerability

  • Severity: 5
  • Published: November 02, 2016

A denial of service flaw was found in OpenSSL 0.9.8, 1.0.1, 1.0.2 through 1.0.2h, and 1.1.0 in the way the TLS/SSL protocol defined processing of ALERT packets during a connection handshake. A remote attacker could use this flaw to make a TLS/SSL server consume an excessive amount of CPU and fail to accept connections from other clients....

Amazon Linux AMI: CVE-2016-8610: Security patch for gnutls ((Multiple Advisories)) Vulnerability

  • Severity: 5
  • Published: November 02, 2016

A denial of service flaw was found in OpenSSL 0.9.8, 1.0.1, 1.0.2 through 1.0.2h, and 1.1.0 in the way the TLS/SSL protocol defined processing of ALERT packets during a connection handshake. A remote attacker could use this flaw to make a TLS/SSL server consume an excessive amount of CPU and fail to accept connections from other clients....

SUSE: CVE-2016-6304: SUSE Linux Security Advisory Vulnerability

  • Severity: 8
  • Published: September 26, 2016

Multiple memory leaks in t1_lib.c in OpenSSL before 1.0.1u, 1.0.2 before 1.0.2i, and 1.1.0 before 1.1.0a allow remote attackers to cause a denial of service (memory consumption) via large OCSP Status Request extensions.