Búsqueda de    
Vulnerabilidad   
    Buscar 324607 Descripciones CVE y
145615 Descripciones de Pruebas,
accesos 10,000+ referencias cruzadas.
Pruebas   CVE   Todos  

ID de Prueba:1.3.6.1.4.1.25623.1.0.107049
Categoría:Denial of Service
Título:OpenSSL 1.0.2 and 1.0.1 Multiple Vulnerabilities (Sep 2016) - Windows
Resumen:OpenSSL is prone to multiple vulnerabilities.
Descripción:Summary:
OpenSSL is prone to multiple vulnerabilities.

Vulnerability Insight:
OpenSSL suffers from the possibility of multiple vulnerabilities due to:

1) Missing message length checks which results in Out of Bounds reads up to 2 bytes beyond the allocated buffer, this leads to Denial of Service.
The attack works only if client authentication is enabled.

2) Calling MDC2_Update() can cause an overflow if an attacker is able to supply very large amounts of input data after a previous
call to EVP_EncryptUpdate() with a partial block then a length check can overflow resulting in a heap corruption.

3) A malfored SHA512 TLS session ticket resulting in an Out of Bounds read which leads to service crash.

4) Unchecking the return value of BN_div_word() function causing an Out of Bounds write if it is used with an overly large BIGNUM. TLS is not affected.

5) Misusing OBJ_obj2txt() function by the function TS_OBJ_print_bio() will results in Out of Bounds reads when large OIDs are presented.

6) DTLS out-of-order messages handling which enable an attacker to cause a DoS attack through memory exhaustion.

7) A flaw in the DTLS replay attack protection mechanism enabling the attacker to send records for next epochs with a very large sequence number,
this causes in dropping all the subsequent legitimate packets and causing a denial of service for a specific DTLS connection.

Vulnerability Impact:
Successful exploitation could result in Denial of Service.

Affected Software/OS:
OpenSSL 1.0.2 and 1.0.1.

Solution:
OpenSSL 1.0.2 users should upgrade to 1.0.2i, OpenSSL 1.0.1 users should upgrade to 1.0.1u.

CVSS Score:
7.5

CVSS Vector:
AV:N/AC:L/Au:N/C:P/I:P/A:P

Referencia Cruzada: Common Vulnerability Exposure (CVE) ID: CVE-2016-6306
BugTraq ID: 93153
http://www.securityfocus.com/bid/93153
http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10759
http://www-01.ibm.com/support/docview.wss?uid=swg21995039
http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html
http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html
http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html
http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html
http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2016-3090545.html
http://www.oracle.com/technetwork/topics/security/ovmbulletinoct2016-3090547.html
https://bto.bluecoat.com/security-advisory/sa132
https://git.openssl.org/?p=openssl.git;a=commit;h=52e623c4cb06fffa9d5e75c60b34b4bc130b12e9
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05302448
https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA40312
https://nodejs.org/en/blog/vulnerability/september-2016-security-releases/
https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03856en_us
https://www.openssl.org/news/secadv/20160922.txt
https://www.tenable.com/security/tns-2016-16
https://www.tenable.com/security/tns-2016-20
https://www.tenable.com/security/tns-2016-21
Debian Security Information: DSA-3673 (Google Search)
http://www.debian.org/security/2016/dsa-3673
FreeBSD Security Advisory: FreeBSD-SA-16:26
https://security.FreeBSD.org/advisories/FreeBSD-SA-16:26.openssl.asc
http://seclists.org/fulldisclosure/2017/Jul/31
https://security.gentoo.org/glsa/201612-16
https://www.arista.com/en/support/advisories-notices/security-advisories/1749-security-advisory-24
https://www.oracle.com/security-alerts/cpuapr2020.html
https://www.oracle.com/security-alerts/cpujan2020.html
https://www.oracle.com/security-alerts/cpujul2020.html
https://www.oracle.com/security-alerts/cpuoct2020.html
https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html
RedHat Security Advisories: RHSA-2016:1940
http://rhn.redhat.com/errata/RHSA-2016-1940.html
RedHat Security Advisories: RHSA-2018:2185
https://access.redhat.com/errata/RHSA-2018:2185
RedHat Security Advisories: RHSA-2018:2186
https://access.redhat.com/errata/RHSA-2018:2186
RedHat Security Advisories: RHSA-2018:2187
https://access.redhat.com/errata/RHSA-2018:2187
http://www.securitytracker.com/id/1036885
SuSE Security Announcement: SUSE-SU-2016:2387 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2016-09/msg00022.html
SuSE Security Announcement: SUSE-SU-2016:2394 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2016-09/msg00024.html
SuSE Security Announcement: SUSE-SU-2016:2458 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00005.html
SuSE Security Announcement: SUSE-SU-2016:2468 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00011.html
SuSE Security Announcement: SUSE-SU-2016:2469 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00012.html
SuSE Security Announcement: SUSE-SU-2016:2470 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00013.html
SuSE Security Announcement: SUSE-SU-2017:2699 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2017-10/msg00010.html
SuSE Security Announcement: SUSE-SU-2017:2700 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2017-10/msg00011.html
SuSE Security Announcement: openSUSE-SU-2016:2391 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2016-09/msg00023.html
SuSE Security Announcement: openSUSE-SU-2016:2407 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2016-09/msg00031.html
SuSE Security Announcement: openSUSE-SU-2016:2496 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00021.html
SuSE Security Announcement: openSUSE-SU-2016:2537 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00029.html
SuSE Security Announcement: openSUSE-SU-2018:0458 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2018-02/msg00032.html
http://www.ubuntu.com/usn/USN-3087-1
http://www.ubuntu.com/usn/USN-3087-2
Common Vulnerability Exposure (CVE) ID: CVE-2016-6303
1036885
92984
http://www.securityfocus.com/bid/92984
FreeBSD-SA-16:26
https://bugzilla.redhat.com/show_bug.cgi?id=1370146
https://cert-portal.siemens.com/productcert/pdf/ssa-412672.pdf
https://git.openssl.org/?p=openssl.git%3Ba=commit%3Bh=55d83bf7c10c7b205fffa23fa7c3977491e56c07
Common Vulnerability Exposure (CVE) ID: CVE-2016-2181
BugTraq ID: 92982
http://www.securityfocus.com/bid/92982
http://www.securitytracker.com/id/1036690
Common Vulnerability Exposure (CVE) ID: CVE-2016-6302
BugTraq ID: 92628
http://www.securityfocus.com/bid/92628
Common Vulnerability Exposure (CVE) ID: CVE-2016-2182
BugTraq ID: 92557
http://www.securityfocus.com/bid/92557
http://www.securitytracker.com/id/1036688
http://www.securitytracker.com/id/1037968
Common Vulnerability Exposure (CVE) ID: CVE-2016-2180
BugTraq ID: 92117
http://www.securityfocus.com/bid/92117
http://www.securitytracker.com/id/1036486
Common Vulnerability Exposure (CVE) ID: CVE-2016-2179
BugTraq ID: 92987
http://www.securityfocus.com/bid/92987
http://www.securitytracker.com/id/1036689
CopyrightCopyright (C) 2016 Greenbone AG

Esta es sólo una de 145615 pruebas de vulnerabilidad en nuestra serie de pruebas. Encuentre más sobre cómo ejecutar una auditoría de seguridad completa.

Para ejecutar una prueba gratuita de esta vulnerabilidad contra su sistema, regístrese ahora.




© 1998-2025 E-Soft Inc. Todos los derechos reservados.