← Zuruck zu CVEs
CVE-2016-6303
CRITICAL9.8
Beschreibung
Integer overflow in the MDC2_Update function in crypto/mdc2/mdc2dgst.c in OpenSSL before 1.1.0 allows remote attackers to cause a denial of service (out-of-bounds write and application crash) or possibly have unspecified other impact via unknown vectors.
CVE Details
CVSS v3.1 Bewertung9.8
SchweregradCRITICAL
CVSS VektorCVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
AngriffsvektorNETWORK
KomplexitatLOW
Erforderliche PrivilegienNONE
BenutzerinteraktionNONE
Veroffentlicht9/16/2016
Zuletzt geandert4/12/2025
Quellenvd
Honeypot-Sichtungen0
Betroffene Produkte
nodejs:node.jsopenssl:openssl
Schwachen (CWE)
CWE-787
Referenzen
http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10759(secalert@redhat.com)
http://www-01.ibm.com/support/docview.wss?uid=swg21995039(secalert@redhat.com)
http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html(secalert@redhat.com)
http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html(secalert@redhat.com)
http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html(secalert@redhat.com)
http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html(secalert@redhat.com)
http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html(secalert@redhat.com)
http://www.securityfocus.com/bid/92984(secalert@redhat.com)
http://www.securitytracker.com/id/1036885(secalert@redhat.com)
https://bto.bluecoat.com/security-advisory/sa132(secalert@redhat.com)
https://bugzilla.redhat.com/show_bug.cgi?id=1370146(secalert@redhat.com)
https://cert-portal.siemens.com/productcert/pdf/ssa-412672.pdf(secalert@redhat.com)
https://git.openssl.org/?p=openssl.git%3Ba=commit%3Bh=55d83bf7c10c7b205fffa23fa7c3977491e56c07(secalert@redhat.com)
https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA40312(secalert@redhat.com)
https://nodejs.org/en/blog/vulnerability/september-2016-security-releases/(secalert@redhat.com)
https://security.FreeBSD.org/advisories/FreeBSD-SA-16:26.openssl.asc(secalert@redhat.com)
https://www.tenable.com/security/tns-2016-16(secalert@redhat.com)
https://www.tenable.com/security/tns-2016-20(secalert@redhat.com)
https://www.tenable.com/security/tns-2016-21(secalert@redhat.com)
http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10759(af854a3a-2127-422b-91ae-364da2661108)
http://www-01.ibm.com/support/docview.wss?uid=swg21995039(af854a3a-2127-422b-91ae-364da2661108)
http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html(af854a3a-2127-422b-91ae-364da2661108)
http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html(af854a3a-2127-422b-91ae-364da2661108)
http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html(af854a3a-2127-422b-91ae-364da2661108)
http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html(af854a3a-2127-422b-91ae-364da2661108)
http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html(af854a3a-2127-422b-91ae-364da2661108)
http://www.securityfocus.com/bid/92984(af854a3a-2127-422b-91ae-364da2661108)
http://www.securitytracker.com/id/1036885(af854a3a-2127-422b-91ae-364da2661108)
https://bto.bluecoat.com/security-advisory/sa132(af854a3a-2127-422b-91ae-364da2661108)
https://bugzilla.redhat.com/show_bug.cgi?id=1370146(af854a3a-2127-422b-91ae-364da2661108)
https://cert-portal.siemens.com/productcert/pdf/ssa-412672.pdf(af854a3a-2127-422b-91ae-364da2661108)
https://git.openssl.org/?p=openssl.git%3Ba=commit%3Bh=55d83bf7c10c7b205fffa23fa7c3977491e56c07(af854a3a-2127-422b-91ae-364da2661108)
https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA40312(af854a3a-2127-422b-91ae-364da2661108)
https://nodejs.org/en/blog/vulnerability/september-2016-security-releases/(af854a3a-2127-422b-91ae-364da2661108)
https://security.FreeBSD.org/advisories/FreeBSD-SA-16:26.openssl.asc(af854a3a-2127-422b-91ae-364da2661108)
https://www.tenable.com/security/tns-2016-16(af854a3a-2127-422b-91ae-364da2661108)
https://www.tenable.com/security/tns-2016-20(af854a3a-2127-422b-91ae-364da2661108)
https://www.tenable.com/security/tns-2016-21(af854a3a-2127-422b-91ae-364da2661108)
IOC Korrelationen
Keine Korrelationen erfasst
This product uses data from the NVD API but is not endorsed or certified by the NVD.