CVE-2016-2107

The AES-NI implementation in OpenSSL before 1.0.1t and 1.0.2 before 1.0.2h does not consider memory allocation during a certain padding check, which allows remote attackers to obtain sensitive cleartext information via a padding-oracle attack against an AES CBC session. NOTE: this vulnerability exists because of an incorrect fix for CVE-2013-0169.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTNIST
5.9 MEDIUM
NETWORK
HIGH
NONE
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
redhatCNA
---
---
CVEADP
---
---
Base Score
CVSS 3.x
EPSS Score
Percentile: 99%
VendorProductVersion
redhatenterprise_linux_desktop
7.0
redhatenterprise_linux_hpc_node
7.0
redhatenterprise_linux_hpc_node_eus
7.2
redhatenterprise_linux_server
7.0
redhatenterprise_linux_server_aus
7.2
redhatenterprise_linux_server_eus
7.2
redhatenterprise_linux_workstation
7.0
opensuseleap
42.1
opensuseopensuse
13.2
opensslopenssl
𝑥
≤ 1.0.1s
opensslopenssl
1.0.2
opensslopenssl
1.0.2:beta1
opensslopenssl
1.0.2:beta2
opensslopenssl
1.0.2:beta3
opensslopenssl
1.0.2a:a
opensslopenssl
1.0.2b:b
opensslopenssl
1.0.2c:c
opensslopenssl
1.0.2d:d
opensslopenssl
1.0.2e:e
opensslopenssl
1.0.2f:f
opensslopenssl
1.0.2g:g
googleandroid
4.0
googleandroid
4.0.1
googleandroid
4.0.2
googleandroid
4.0.3
googleandroid
4.0.4
googleandroid
4.1
googleandroid
4.1.2
googleandroid
4.2
googleandroid
4.2.1
googleandroid
4.2.2
googleandroid
4.3
googleandroid
4.3.1
googleandroid
4.4
googleandroid
4.4.1
googleandroid
4.4.2
googleandroid
4.4.3
googleandroid
5.0
googleandroid
5.0.1
googleandroid
5.1
googleandroid
5.1.0
hphelion_openstack
2.0.0
hphelion_openstack
2.1.0
hphelion_openstack
2.1.2
hphelion_openstack
2.1.4
redhatenterprise_linux_desktop
6.0
redhatenterprise_linux_hpc_node
6.0
redhatenterprise_linux_server
6.0
redhatenterprise_linux_workstation
6.0
nodejsnode.js
0.10.0 ≤
𝑥
< 0.10.45
nodejsnode.js
0.12.0 ≤
𝑥
< 0.12.14
nodejsnode.js
4.0.0 ≤
𝑥
≤ 4.1.2
nodejsnode.js
4.2.0 ≤
𝑥
< 4.4.4
nodejsnode.js
5.0.0 ≤
𝑥
< 5.11.1
nodejsnode.js
6.0.0
debiandebian_linux
8.0
canonicalubuntu_linux
12.04
canonicalubuntu_linux
14.04
canonicalubuntu_linux
15.10
canonicalubuntu_linux
16.04
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
openssl
bullseye
1.1.1w-0+deb11u1
fixed
bullseye (security)
1.1.1w-0+deb11u2
fixed
bookworm
3.0.14-1~deb12u1
fixed
bookworm (security)
3.0.14-1~deb12u2
fixed
sid
3.3.2-2
fixed
trixie
3.3.2-2
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
openssl
disco
Fixed 1.0.2g-1ubuntu5
released
cosmic
Fixed 1.0.2g-1ubuntu5
released
bionic
Fixed 1.0.2g-1ubuntu5
released
artful
Fixed 1.0.2g-1ubuntu5
released
zesty
Fixed 1.0.2g-1ubuntu5
released
yakkety
Fixed 1.0.2g-1ubuntu5
released
xenial
Fixed 1.0.2g-1ubuntu4.1
released
wily
Fixed 1.0.2d-0ubuntu1.5
released
trusty
Fixed 1.0.1f-1ubuntu2.19
released
precise
Fixed 1.0.1-4ubuntu5.36
released
openssl098
disco
dne
cosmic
dne
bionic
dne
artful
dne
zesty
dne
yakkety
dne
xenial
dne
wily
dne
trusty
dne
precise
ignored
References