CVE-2016-2177
20.06.2016, 01:59
OpenSSL through 1.0.2h incorrectly uses pointer arithmetic for heap-buffer boundary checks, which might allow remote attackers to cause a denial of service (integer overflow and application crash) or possibly have unspecified other impact by leveraging unexpected malloc behavior, related to s3_srvr.c, ssl_sess.c, and t1_lib.c.Enginsight
| Vendor | Product | Version |
|---|---|---|
| hp | icewall_mcrp | 3.0 |
| hp | icewall_sso | 10.0 |
| hp | icewall_sso | 10.0 |
| hp | icewall_sso_agent_option | 10.0 |
| openssl | openssl | 1.0.1 |
| openssl | openssl | 1.0.1a:a |
| openssl | openssl | 1.0.1b:b |
| openssl | openssl | 1.0.1c:c |
| openssl | openssl | 1.0.1d:d |
| openssl | openssl | 1.0.1e:e |
| openssl | openssl | 1.0.1f:f |
| openssl | openssl | 1.0.1g:g |
| openssl | openssl | 1.0.1h:h |
| openssl | openssl | 1.0.1i:i |
| openssl | openssl | 1.0.1j:j |
| openssl | openssl | 1.0.1k:k |
| openssl | openssl | 1.0.1l:l |
| openssl | openssl | 1.0.1m:m |
| openssl | openssl | 1.0.1n:n |
| openssl | openssl | 1.0.1o:o |
| openssl | openssl | 1.0.1p:p |
| openssl | openssl | 1.0.1q:q |
| openssl | openssl | 1.0.1r:r |
| openssl | openssl | 1.0.1s:s |
| openssl | openssl | 1.0.1t:t |
| openssl | openssl | 1.0.2 |
| openssl | openssl | 1.0.2a:a |
| openssl | openssl | 1.0.2b:b |
| openssl | openssl | 1.0.2c:c |
| openssl | openssl | 1.0.2d:d |
| openssl | openssl | 1.0.2e:e |
| openssl | openssl | 1.0.2f:f |
| openssl | openssl | 1.0.2g:g |
| openssl | openssl | 1.0.2h:h |
| oracle | solaris | 11.3 |
𝑥
= Vulnerable software versions
Debian Releases
Ubuntu Releases
Ubuntu Product | |||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| openssl |
| ||||||||||||||||||||
| openssl098 |
|
References