vulnerability
Oracle Solaris 11: CVE-2016-2183: Vulnerability in MySQL, OpenSSL
| Severity | CVSS | Published | Added | Modified |
|---|---|---|---|---|
| 5 | (AV:N/AC:L/Au:N/C:P/I:N/A:N) | Aug 31, 2016 | May 29, 2017 | Feb 1, 2022 |
Severity
5
CVSS
(AV:N/AC:L/Au:N/C:P/I:N/A:N)
Published
Aug 31, 2016
Added
May 29, 2017
Modified
Feb 1, 2022
Description
The DES and Triple DES ciphers, as used in the TLS, SSH, and IPSec protocols and other protocols and products, have a birthday bound of approximately four billion blocks, which makes it easier for remote attackers to obtain cleartext data via a birthday attack against a long-duration encrypted session, as demonstrated by an HTTPS session using Triple DES in CBC mode, aka a "Sweet32" attack.
Solutions
oracle-solaris-11-3-upgrade-database-mysql-55-5-5-54-0-175-3-19-0-2-0oracle-solaris-11-3-upgrade-database-mysql-55-client-5-5-54-0-175-3-19-0-2-0oracle-solaris-11-3-upgrade-database-mysql-55-library-5-5-54-0-175-3-19-0-2-0oracle-solaris-11-3-upgrade-database-mysql-55-tests-5-5-54-0-175-3-19-0-2-0oracle-solaris-11-3-upgrade-database-mysql-56-5-6-35-0-175-3-19-0-2-0oracle-solaris-11-3-upgrade-database-mysql-56-client-5-6-35-0-175-3-19-0-2-0oracle-solaris-11-3-upgrade-database-mysql-56-library-5-6-35-0-175-3-19-0-2-0oracle-solaris-11-3-upgrade-database-mysql-56-tests-5-6-35-0-175-3-19-0-2-0oracle-solaris-11-3-upgrade-database-mysql-57-5-7-23-0-175-3-35-0-5-0oracle-solaris-11-3-upgrade-database-mysql-57-client-5-7-23-0-175-3-35-0-5-0oracle-solaris-11-3-upgrade-database-mysql-57-embedded-5-7-23-0-175-3-35-0-5-0oracle-solaris-11-3-upgrade-database-mysql-57-library-5-7-23-0-175-3-35-0-5-0oracle-solaris-11-3-upgrade-database-mysql-57-tests-5-7-23-0-175-3-35-0-5-0oracle-solaris-11-3-upgrade-library-security-openssl-1-0-1-21-0-175-3-13-0-4-0oracle-solaris-11-3-upgrade-library-security-openssl-openssl-fips-140-2-0-6-0-175-3-13-0-4-0oracle-solaris-11-3-upgrade-runtime-perl-512-5-12-5-0-175-3-19-0-2-0oracle-solaris-11-3-upgrade-runtime-perl-threaded-512-5-12-5-0-175-3-19-0-2-0
References
Rapid7 Labs
2026 Global Threat Landscape Report
The predictive window has collapsed. Exploitation follows disclosure in days. See how attackers are accelerating and how to stay ahead.