CVE-2016-0797
03.03.2016, 20:59
Multiple integer overflows in OpenSSL 1.0.1 before 1.0.1s and 1.0.2 before 1.0.2g allow remote attackers to cause a denial of service (heap memory corruption or NULL pointer dereference) or possibly have unspecified other impact via a long digit string that is mishandled by the (1) BN_dec2bn or (2) BN_hex2bn function, related to crypto/bn/bn.h and crypto/bn/bn_print.c.Enginsight
Vendor | Product | Version |
---|---|---|
openssl | openssl | 1.0.1 |
openssl | openssl | 1.0.1:beta1 |
openssl | openssl | 1.0.1:beta2 |
openssl | openssl | 1.0.1:beta3 |
openssl | openssl | 1.0.1a:a |
openssl | openssl | 1.0.1b:b |
openssl | openssl | 1.0.1c:c |
openssl | openssl | 1.0.1d:d |
openssl | openssl | 1.0.1e:e |
openssl | openssl | 1.0.1f:f |
openssl | openssl | 1.0.1g:g |
openssl | openssl | 1.0.1h:h |
openssl | openssl | 1.0.1i:i |
openssl | openssl | 1.0.1j:j |
openssl | openssl | 1.0.1k:k |
openssl | openssl | 1.0.1l:l |
openssl | openssl | 1.0.1m:m |
openssl | openssl | 1.0.1n:n |
openssl | openssl | 1.0.1o:o |
openssl | openssl | 1.0.1p:p |
openssl | openssl | 1.0.1q:q |
openssl | openssl | 1.0.1r:r |
openssl | openssl | 1.0.2 |
openssl | openssl | 1.0.2:beta1 |
openssl | openssl | 1.0.2:beta2 |
openssl | openssl | 1.0.2:beta3 |
openssl | openssl | 1.0.2a:a |
openssl | openssl | 1.0.2b:b |
openssl | openssl | 1.0.2c:c |
openssl | openssl | 1.0.2d:d |
openssl | openssl | 1.0.2e:e |
openssl | openssl | 1.0.2f:f |
nodejs | node.js | 4.0.0 ≤ 𝑥 < 4.1.2 |
nodejs | node.js | 4.2.0 ≤ 𝑥 < 4.3.2 |
nodejs | node.js | 5.0.0 ≤ 𝑥 < 5.7.1 |
canonical | ubuntu_linux | 12.04 |
canonical | ubuntu_linux | 14.04 |
canonical | ubuntu_linux | 15.10 |
debian | debian_linux | 7.0 |
debian | debian_linux | 8.0 |
𝑥
= Vulnerable software versions

Debian Releases

Ubuntu Releases
Ubuntu Product | |||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
openssl |
| ||||||||||||||||||||
openssl098 |
|
References