CVE-2016-2107

EUVD-2016-3210
The AES-NI implementation in OpenSSL before 1.0.1t and 1.0.2 before 1.0.2h does not consider memory allocation during a certain padding check, which allows remote attackers to obtain sensitive cleartext information via a padding-oracle attack against an AES CBC session. NOTE: this vulnerability exists because of an incorrect fix for CVE-2013-0169.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTPrimary
5.9 MEDIUM
NETWORK
HIGH
NONE
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
Base Score
CVSS 3.x
EPSS Score
Percentile: 99%
Affected Products (NVD)
VendorProductVersion
redhatenterprise_linux_desktop
7.0
redhatenterprise_linux_hpc_node
7.0
redhatenterprise_linux_hpc_node_eus
7.2
redhatenterprise_linux_server
7.0
redhatenterprise_linux_server_aus
7.2
redhatenterprise_linux_server_eus
7.2
redhatenterprise_linux_workstation
7.0
opensuseleap
42.1
opensuseopensuse
13.2
opensslopenssl
𝑥
≤ 1.0.1s
opensslopenssl
1.0.2
opensslopenssl
1.0.2:beta1
opensslopenssl
1.0.2:beta2
opensslopenssl
1.0.2:beta3
opensslopenssl
1.0.2a:a
opensslopenssl
1.0.2b:b
opensslopenssl
1.0.2c:c
opensslopenssl
1.0.2d:d
opensslopenssl
1.0.2e:e
opensslopenssl
1.0.2f:f
opensslopenssl
1.0.2g:g
googleandroid
4.0
googleandroid
4.0.1
googleandroid
4.0.2
googleandroid
4.0.3
googleandroid
4.0.4
googleandroid
4.1
googleandroid
4.1.2
googleandroid
4.2
googleandroid
4.2.1
googleandroid
4.2.2
googleandroid
4.3
googleandroid
4.3.1
googleandroid
4.4
googleandroid
4.4.1
googleandroid
4.4.2
googleandroid
4.4.3
googleandroid
5.0
googleandroid
5.0.1
googleandroid
5.1
googleandroid
5.1.0
hphelion_openstack
2.0.0
hphelion_openstack
2.1.0
hphelion_openstack
2.1.2
hphelion_openstack
2.1.4
redhatenterprise_linux_desktop
6.0
redhatenterprise_linux_hpc_node
6.0
redhatenterprise_linux_server
6.0
redhatenterprise_linux_workstation
6.0
nodejsnode.js
0.10.0 ≤
𝑥
< 0.10.45
nodejsnode.js
0.12.0 ≤
𝑥
< 0.12.14
nodejsnode.js
4.0.0 ≤
𝑥
≤ 4.1.2
nodejsnode.js
4.2.0 ≤
𝑥
< 4.4.4
nodejsnode.js
5.0.0 ≤
𝑥
< 5.11.1
nodejsnode.js
6.0.0
debiandebian_linux
8.0
canonicalubuntu_linux
12.04
canonicalubuntu_linux
14.04
canonicalubuntu_linux
15.10
canonicalubuntu_linux
16.04
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
openssl
bookworm
3.0.14-1~deb12u1
fixed
bookworm (security)
3.0.14-1~deb12u2
fixed
bullseye
1.1.1w-0+deb11u1
fixed
bullseye (security)
1.1.1w-0+deb11u2
fixed
sid
3.3.2-2
fixed
trixie
3.3.2-2
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
openssl
artful
Fixed 1.0.2g-1ubuntu5
released
bionic
Fixed 1.0.2g-1ubuntu5
released
cosmic
Fixed 1.0.2g-1ubuntu5
released
disco
Fixed 1.0.2g-1ubuntu5
released
precise
Fixed 1.0.1-4ubuntu5.36
released
trusty
Fixed 1.0.1f-1ubuntu2.19
released
wily
Fixed 1.0.2d-0ubuntu1.5
released
xenial
Fixed 1.0.2g-1ubuntu4.1
released
yakkety
Fixed 1.0.2g-1ubuntu5
released
zesty
Fixed 1.0.2g-1ubuntu5
released
openssl098
artful
dne
bionic
dne
cosmic
dne
disco
dne
precise
ignored
trusty
dne
wily
dne
xenial
dne
yakkety
dne
zesty
dne
References