vulnerability
Red Hat: CVE-2016-0799: Important: openssl security update ((Multiple Advisories))
Severity | CVSS | Published | Added | Modified |
---|---|---|---|---|
10 | (AV:N/AC:L/Au:N/C:C/I:C/A:C) | 2016-03-03 | 2017-10-06 | 2017-12-22 |
Severity
10
CVSS
(AV:N/AC:L/Au:N/C:C/I:C/A:C)
Published
2016-03-03
Added
2017-10-06
Modified
2017-12-22
Description
The fmtstr function in crypto/bio/b_print.c in OpenSSL 1.0.1 before 1.0.1s and 1.0.2 before 1.0.2g improperly calculates string lengths, which allows remote attackers to cause a denial of service (overflow and out-of-bounds read) or possibly have unspecified other impact via a long string, as demonstrated by a large amount of ASN.1 data, a different vulnerability than CVE-2016-2842.
Solution(s)
redhat-upgrade-opensslredhat-upgrade-openssl-debuginforedhat-upgrade-openssl-develredhat-upgrade-openssl-libsredhat-upgrade-openssl-perlredhat-upgrade-openssl-static
References
- BID-83755
- BID-91787
- DEBIAN-DSA-3500
- FREEBSD-FreeBSD-SA-16:12
- GENTOO-GLSA-201603-15
- NVD-CVE-2016-0799
- REDHAT-RHSA-2016:0722
- REDHAT-RHSA-2016:0996
- SECTRACK-1035133
- SUSE-SUSE-SU-2016:0617
- SUSE-SUSE-SU-2016:0620
- SUSE-SUSE-SU-2016:0621
- SUSE-SUSE-SU-2016:0624
- SUSE-SUSE-SU-2016:0631
- SUSE-SUSE-SU-2016:0641
- SUSE-SUSE-SU-2016:0678
- SUSE-SUSE-SU-2016:1057
- UBUNTU-USN-2914-1

NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.