Home / CVE DB / CVE-2016-9843
Standard
Vulnerability Identifier

CVE-2016-9843

2017-05-23
Severity Assessment
9.8
CRITICAL
CVSS v3.x Score
Clinical Analysis (Description)

The crc32_big function in crc32.c in zlib 1.2.8 might allow context-dependent attackers to have unspecified impact via vectors involving big-endian CRC calculation.

Vector Sequencing

Attack Parameters

Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Impact Consequences

Technical Impact

Unchanged
Scope
High
Confidentiality
High
Integrity
High
Availability
AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
CVSS v2 Score (Legacy)
7.5

For backward compatibility

EPSS Probability
7.98%

Percentile: 91.8%

Weakness Classification

CWE-NVD-CWE-noinfo

Affected Population

Affected Configurations

Total: 146 detected entries

Software List Scrollable
ap
iphone_os
Vendor: apple • v6.1.6
ap
iphone_os
Vendor: apple • v4.2.9
ap
iphone_os
Vendor: apple • v4.2.5
ap
iphone_os
Vendor: apple • v8.1.3
ap
iphone_os
Vendor: apple • v8.0.1
op
opensuse
Vendor: opensuse • v13.2
ap
iphone_os
Vendor: apple • v8.3
ap
iphone_os
Vendor: apple • v1.0.2
ap
watchos
Vendor: apple • v2.0
ap
iphone_os
Vendor: apple • v10.3.3
re
enterprise_linux_eus
Vendor: redhat • v7.5
ap
iphone_os
Vendor: apple • v8.1.1
ap
watchos
Vendor: apple • v3.2.2
ap
iphone_os
Vendor: apple • v1.1.0
or
jdk
Vendor: oracle • v1.6.0
ap
iphone_os
Vendor: apple • v3.1.1
ap
iphone_os
Vendor: apple • v2.1.1
ap
iphone_os
Vendor: apple • v9.3.5
ap
iphone_os
Vendor: apple • v1.0.0
ca
ubuntu_linux
Vendor: canonical • v16.04
ap
iphone_os
Vendor: apple • v7.0.3
re
enterprise_linux_workstation
Vendor: redhat • v7.0
ap
iphone_os
Vendor: apple • v4.3.3
ap
watchos
Vendor: apple • v2.0.1
ca
ubuntu_linux
Vendor: canonical • v18.04
ap
iphone_os
Vendor: apple • v7.0.2
ap
iphone_os
Vendor: apple • v2.0.2
ap
watchos
Vendor: apple • v3.2.3
ap
iphone_os
Vendor: apple • v4.3.4
ap
iphone_os
Vendor: apple • v2.1
de
debian_linux
Vendor: debian • v8.0
ap
watchos
Vendor: apple • v3.1.1
ap
watchos
Vendor: apple • v2.2.1
ap
watchos
Vendor: apple • v3.0
or
database_server
Vendor: oracle • v18c
ap
iphone_os
Vendor: apple • v10.3
ap
iphone_os
Vendor: apple • v10.2.1
ap
iphone_os
Vendor: apple • v7.0.4
ap
iphone_os
Vendor: apple • v1.0.1
ap
iphone_os
Vendor: apple • v3.2
ap
iphone_os
Vendor: apple • v7.0
ap
iphone_os
Vendor: apple • v3.1.3
ne
oncommand_workflow_automation
Vendor: netapp • v-
ap
iphone_os
Vendor: apple • v9.3.1
ap
iphone_os
Vendor: apple • v10.0.3
ap
iphone_os
Vendor: apple • v9.3.2
ap
iphone_os
Vendor: apple • v10.0.2
ap
iphone_os
Vendor: apple • v3.2.2
ap
iphone_os
Vendor: apple • v9.3
ap
iphone_os
Vendor: apple • v1.1.4
ap
iphone_os
Vendor: apple • v2.2
op
leap
Vendor: opensuse • v42.1
ap
iphone_os
Vendor: apple • v3.2.1
ap
watchos
Vendor: apple • v1.0
ne
snapcenter
Vendor: netapp • v-
or
jdk
Vendor: oracle • v1.7.0
ap
watchos
Vendor: apple • v3.2
re
enterprise_linux_server
Vendor: redhat • v6.0
ap
iphone_os
Vendor: apple • v8.4
ap
iphone_os
Vendor: apple • v1.1.2
ap
watchos
Vendor: apple • v1.0.1
ap
iphone_os
Vendor: apple • v10.3.4
ap
iphone_os
Vendor: apple • v10.3.1
ap
iphone_os
Vendor: apple • v5.1.1
ap
iphone_os
Vendor: apple • v5.0
ap
watchos
Vendor: apple • v3.1.3
ap
iphone_os
Vendor: apple • v9.3.4
or
jdk
Vendor: oracle • v1.8.0
ap
iphone_os
Vendor: apple • v8.2
ap
iphone_os
Vendor: apple • v6.1.5
ap
watchos
Vendor: apple • v2.2
ap
iphone_os
Vendor: apple • v2.2.1
ap
iphone_os
Vendor: apple • v9.3.3
ap
iphone_os
Vendor: apple • v8.1.2
re
satellite
Vendor: redhat • v5.8
re
enterprise_linux_server
Vendor: redhat • v7.0
ap
iphone_os
Vendor: apple • v6.1.2
ap
iphone_os
Vendor: apple • v7.0.6
ap
iphone_os
Vendor: apple • v8.0
ap
iphone_os
Vendor: apple • v10.1.1
ap
watchos
Vendor: apple • v2.1
ap
iphone_os
Vendor: apple • v9.2
ap
iphone_os
Vendor: apple • v4.0.1
or
jre
Vendor: oracle • v1.6.0
ap
watchos
Vendor: apple • v2.2.2
ap
watchos
Vendor: apple • v3.1
ap
iphone_os
Vendor: apple • v7.1.2
ap
iphone_os
Vendor: apple • v2.0.1
ap
iphone_os
Vendor: apple • v9.0
ap
iphone_os
Vendor: apple • v4.2.8
ap
iphone_os
Vendor: apple • v4.2
ap
iphone_os
Vendor: apple • v1.1
ap
iphone_os
Vendor: apple • v10.2
ap
iphone_os
Vendor: apple • v9.0.2
ap
iphone_os
Vendor: apple • v9.3.6
ap
iphone_os
Vendor: apple • v1.1.1
ap
iphone_os
Vendor: apple • v6.1.4
or
jre
Vendor: oracle • v1.7.0
ap
iphone_os
Vendor: apple • v6.1
ap
iphone_os
Vendor: apple • v10.0
ap
iphone_os
Vendor: apple • v6.1.3
ap
iphone_os
Vendor: apple • v4.2.10
ap
iphone_os
Vendor: apple • v9.0.1
ap
iphone_os
Vendor: apple • v4.3.5
ap
iphone_os
Vendor: apple • v7.1.1
re
enterprise_linux_eus
Vendor: redhat • v7.4
ap
iphone_os
Vendor: apple • v4.3.0
ap
iphone_os
Vendor: apple • v4.0.2
ne
oncommand_insight
Vendor: netapp • v-
ap
iphone_os
Vendor: apple • v8.4.1
ap
iphone_os
Vendor: apple • v9.1
ap
iphone_os
Vendor: apple • v4.3.1
ap
iphone_os
Vendor: apple • v8.1
ap
iphone_os
Vendor: apple • v1.0
ap
iphone_os
Vendor: apple • v3.1
ap
iphone_os
Vendor: apple • v9.2.1
re
enterprise_linux_desktop
Vendor: redhat • v7.0
ap
iphone_os
Vendor: apple • v4.2.1
ap
iphone_os
Vendor: apple • v5.0.1
ap
iphone_os
Vendor: apple • v2.0
ap
iphone_os
Vendor: apple • v1.1.3
ap
iphone_os
Vendor: apple • v4.1
ap
iphone_os
Vendor: apple • v5.1
ap
iphone_os
Vendor: apple • v3.0
ap
iphone_os
Vendor: apple • v6.0.1
ap
iphone_os
Vendor: apple • v7.0.1
ap
iphone_os
Vendor: apple • v4.3.2
ap
iphone_os
Vendor: apple • v10.0.1
ap
iphone_os
Vendor: apple • v1.1.5
ap
iphone_os
Vendor: apple • v4.0
ap
iphone_os
Vendor: apple • v10.3.2
re
enterprise_linux_desktop
Vendor: redhat • v6.0
ap
iphone_os
Vendor: apple • v8.0.2
ap
iphone_os
Vendor: apple • v6.0.2
ap
iphone_os
Vendor: apple • v10.1
op
leap
Vendor: opensuse • v42.2
ap
iphone_os
Vendor: apple • v2.0.0
ap
iphone_os
Vendor: apple • v3.0.1
ap
iphone_os
Vendor: apple • v7.1
ap
iphone_os
Vendor: apple • v7.0.5
ap
iphone_os
Vendor: apple • v3.1.2
ap
iphone_os
Vendor: apple • v4.2.6
ap
iphone_os
Vendor: apple • v6.0
ap
iphone_os
Vendor: apple • v4.2.7
or
jre
Vendor: oracle • v1.8.0
re
enterprise_linux_workstation
Vendor: redhat • v6.0
Timeline

Time Line

PUBLICATION
23 May 2017
MODIFICATION
20 Apr 2025
FIRST PATCH
14 Jan 2026
Impact Statistics

Key Metrics

CVSS Score
9.8
CRITICAL
Products
146
Affected
Patches
2
Available
Remediation Protocol

Recommended Solution

No automatic solution found. Check vendor references.
Recommended Actions for Administrators

Immediate Action Plan

1. Inventory

Identify all affected systems in your infrastructure.

2. Assessment

Assess exposure and criticality for your organization.

3. Mitigation

Apply patches or available workarounds.

4. Verification

Test and confirm effectiveness of applied measures.

⚠️ MAXIMUM PRIORITY - Immediate action required