CVE-2016-2181
Low
Low
Medium
High
Critical
CVSS Score
Vulnerability Description
The Anti-Replay feature in the DTLS implementation in OpenSSL before 1.1.0 mishandles early use of a new epoch number in conjunction with a large sequence number, which allows remote attackers to cause a denial of service (false-positive packet drops) via spoofed DTLS records, related to rec_layer_d1.c and ssl3_record.c.
Known Affected Software
32 configuration(s) from 2 vendor(s)
openssl
Version:
1.0.1d
CPE:
cpe:2.3:a:openssl:openssl:1.0.1d:*:*:*:*:*:*:*
openssl
Version:
1.0.2c
CPE:
cpe:2.3:a:openssl:openssl:1.0.2c:*:*:*:*:*:*:*
openssl
Version:
1.0.1b
CPE:
cpe:2.3:a:openssl:openssl:1.0.1b:*:*:*:*:*:*:*
openssl
Version:
1.0.1a
CPE:
cpe:2.3:a:openssl:openssl:1.0.1a:*:*:*:*:*:*:*
openssl
Version:
1.0.2g
CPE:
cpe:2.3:a:openssl:openssl:1.0.2g:*:*:*:*:*:*:*
openssl
Version:
1.0.1k
CPE:
cpe:2.3:a:openssl:openssl:1.0.1k:*:*:*:*:*:*:*
openssl
Version:
1.0.1n
CPE:
cpe:2.3:a:openssl:openssl:1.0.1n:*:*:*:*:*:*:*
openssl
Version:
1.0.1s
CPE:
cpe:2.3:a:openssl:openssl:1.0.1s:*:*:*:*:*:*:*
openssl
Version:
1.0.1q
CPE:
cpe:2.3:a:openssl:openssl:1.0.1q:*:*:*:*:*:*:*
openssl
Version:
1.0.2e
CPE:
cpe:2.3:a:openssl:openssl:1.0.2e:*:*:*:*:*:*:*
openssl
Version:
1.0.2
CPE:
cpe:2.3:a:openssl:openssl:1.0.2:-:*:*:*:*:*:*
openssl
Version:
1.0.1r
CPE:
cpe:2.3:a:openssl:openssl:1.0.1r:*:*:*:*:*:*:*
openssl
Version:
1.0.2d
CPE:
cpe:2.3:a:openssl:openssl:1.0.2d:*:*:*:*:*:*:*
openssl
Version:
1.0.2h
CPE:
cpe:2.3:a:openssl:openssl:1.0.2h:*:*:*:*:*:*:*
openssl
Version:
1.0.1i
CPE:
cpe:2.3:a:openssl:openssl:1.0.1i:*:*:*:*:*:*:*
openssl
Version:
1.0.2a
CPE:
cpe:2.3:a:openssl:openssl:1.0.2a:*:*:*:*:*:*:*
openssl
Version:
1.0.1f
CPE:
cpe:2.3:a:openssl:openssl:1.0.1f:*:*:*:*:*:*:*
openssl
Version:
1.0.1h
CPE:
cpe:2.3:a:openssl:openssl:1.0.1h:*:*:*:*:*:*:*
openssl
Version:
1.0.1j
CPE:
cpe:2.3:a:openssl:openssl:1.0.1j:*:*:*:*:*:*:*
openssl
Version:
1.0.1p
CPE:
cpe:2.3:a:openssl:openssl:1.0.1p:*:*:*:*:*:*:*
openssl
Version:
1.0.1g
CPE:
cpe:2.3:a:openssl:openssl:1.0.1g:*:*:*:*:*:*:*
openssl
Version:
1.0.1e
CPE:
cpe:2.3:a:openssl:openssl:1.0.1e:*:*:*:*:*:*:*
openssl
Version:
1.0.2f
CPE:
cpe:2.3:a:openssl:openssl:1.0.2f:*:*:*:*:*:*:*
openssl
Version:
1.0.1
CPE:
cpe:2.3:a:openssl:openssl:1.0.1:-:*:*:*:*:*:*
openssl
Version:
1.0.1m
CPE:
cpe:2.3:a:openssl:openssl:1.0.1m:*:*:*:*:*:*:*
openssl
Version:
1.0.1l
CPE:
cpe:2.3:a:openssl:openssl:1.0.1l:*:*:*:*:*:*:*
openssl
Version:
1.0.1c
CPE:
cpe:2.3:a:openssl:openssl:1.0.1c:*:*:*:*:*:*:*
openssl
Version:
1.0.1t
CPE:
cpe:2.3:a:openssl:openssl:1.0.1t:*:*:*:*:*:*:*
openssl
Version:
1.0.1o
CPE:
cpe:2.3:a:openssl:openssl:1.0.1o:*:*:*:*:*:*:*
openssl
Version:
1.0.2b
CPE:
cpe:2.3:a:openssl:openssl:1.0.2b:*:*:*:*:*:*:*
linux
Version:
7
CPE:
cpe:2.3:o:oracle:linux:7:8:*:*:*:*:*:*
linux
Version:
6
CPE:
cpe:2.3:o:oracle:linux:6:10:*:*:*:*:*:*
This vulnerability affects 32 software configuration(s). Ensure you patch all affected systems.
References & Resources
-
http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10759secalert@redhat.com Third Party Advisory
-
http://lists.opensuse.org/opensuse-security-announce/2016-09/msg00022.htmlsecalert@redhat.com
-
http://lists.opensuse.org/opensuse-security-announce/2016-09/msg00023.htmlsecalert@redhat.com
-
http://lists.opensuse.org/opensuse-security-announce/2016-09/msg00024.htmlsecalert@redhat.com
-
http://lists.opensuse.org/opensuse-security-announce/2016-09/msg00031.htmlsecalert@redhat.com
-
http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00005.htmlsecalert@redhat.com
-
http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00011.htmlsecalert@redhat.com
-
http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00012.htmlsecalert@redhat.com
-
http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00029.htmlsecalert@redhat.com
-
http://lists.opensuse.org/opensuse-security-announce/2017-10/msg00010.htmlsecalert@redhat.com
-
http://lists.opensuse.org/opensuse-security-announce/2017-10/msg00011.htmlsecalert@redhat.com
-
http://lists.opensuse.org/opensuse-security-announce/2018-02/msg00032.htmlsecalert@redhat.com
-
http://rhn.redhat.com/errata/RHSA-2016-1940.htmlsecalert@redhat.com
-
http://seclists.org/fulldisclosure/2017/Jul/31secalert@redhat.com
-
http://www-01.ibm.com/support/docview.wss?uid=swg21995039secalert@redhat.com Third Party Advisory
-
http://www.debian.org/security/2016/dsa-3673secalert@redhat.com
-
http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20170322-01-openssl-ensecalert@redhat.com
-
http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.htmlsecalert@redhat.com
-
http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.htmlsecalert@redhat.com
-
http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.htmlsecalert@redhat.com
-
http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.htmlsecalert@redhat.com Third Party Advisory
-
http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.htmlsecalert@redhat.com
-
http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2016-3090545.htmlsecalert@redhat.com Third Party Advisory
-
http://www.oracle.com/technetwork/topics/security/ovmbulletinoct2016-3090547.htmlsecalert@redhat.com Third Party Advisory
-
http://www.securityfocus.com/bid/92982secalert@redhat.com Third Party Advisory VDB Entry
-
http://www.securitytracker.com/id/1036690secalert@redhat.com
-
http://www.splunk.com/view/SP-CAAAPSVsecalert@redhat.com Third Party Advisory
-
http://www.splunk.com/view/SP-CAAAPUEsecalert@redhat.com Third Party Advisory
-
http://www.ubuntu.com/usn/USN-3087-1secalert@redhat.com
-
http://www.ubuntu.com/usn/USN-3087-2secalert@redhat.com
-
https://bto.bluecoat.com/security-advisory/sa132secalert@redhat.com Third Party Advisory
-
https://cert-portal.siemens.com/productcert/pdf/ssa-412672.pdfsecalert@redhat.com
-
https://git.openssl.org/?p=openssl.git%3Ba=commit%3Bh=1fb9fdc3027b27d8eb6a1e6a846435b070980770secalert@redhat.com
-
https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA40312secalert@redhat.com Third Party Advisory
-
https://kc.mcafee.com/corporate/index?page=content&id=SB10215secalert@redhat.com
-
https://security.FreeBSD.org/advisories/FreeBSD-SA-16:26.openssl.ascsecalert@redhat.com
-
https://support.f5.com/csp/article/K59298921secalert@redhat.com
-
https://www.arista.com/en/support/advisories-notices/security-advisories/1749-security-advisory-24secalert@redhat.com
-
https://www.tenable.com/security/tns-2016-16secalert@redhat.com Third Party Advisory
-
https://www.tenable.com/security/tns-2016-20secalert@redhat.com
-
https://www.tenable.com/security/tns-2016-21secalert@redhat.com
-
http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10759af854a3a-2127-422b-91ae-364da2661108 Third Party Advisory
-
http://lists.opensuse.org/opensuse-security-announce/2016-09/msg00022.htmlaf854a3a-2127-422b-91ae-364da2661108
-
http://lists.opensuse.org/opensuse-security-announce/2016-09/msg00023.htmlaf854a3a-2127-422b-91ae-364da2661108
-
http://lists.opensuse.org/opensuse-security-announce/2016-09/msg00024.htmlaf854a3a-2127-422b-91ae-364da2661108
-
http://lists.opensuse.org/opensuse-security-announce/2016-09/msg00031.htmlaf854a3a-2127-422b-91ae-364da2661108
-
http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00005.htmlaf854a3a-2127-422b-91ae-364da2661108
-
http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00011.htmlaf854a3a-2127-422b-91ae-364da2661108
-
http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00012.htmlaf854a3a-2127-422b-91ae-364da2661108
-
http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00029.htmlaf854a3a-2127-422b-91ae-364da2661108
-
http://lists.opensuse.org/opensuse-security-announce/2017-10/msg00010.htmlaf854a3a-2127-422b-91ae-364da2661108
-
http://lists.opensuse.org/opensuse-security-announce/2017-10/msg00011.htmlaf854a3a-2127-422b-91ae-364da2661108
-
http://lists.opensuse.org/opensuse-security-announce/2018-02/msg00032.htmlaf854a3a-2127-422b-91ae-364da2661108
-
http://rhn.redhat.com/errata/RHSA-2016-1940.htmlaf854a3a-2127-422b-91ae-364da2661108
-
http://seclists.org/fulldisclosure/2017/Jul/31af854a3a-2127-422b-91ae-364da2661108
-
http://www-01.ibm.com/support/docview.wss?uid=swg21995039af854a3a-2127-422b-91ae-364da2661108 Third Party Advisory
-
http://www.debian.org/security/2016/dsa-3673af854a3a-2127-422b-91ae-364da2661108
-
http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20170322-01-openssl-enaf854a3a-2127-422b-91ae-364da2661108
-
http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.htmlaf854a3a-2127-422b-91ae-364da2661108
-
http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.htmlaf854a3a-2127-422b-91ae-364da2661108
-
http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.htmlaf854a3a-2127-422b-91ae-364da2661108
-
http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.htmlaf854a3a-2127-422b-91ae-364da2661108 Third Party Advisory
-
http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.htmlaf854a3a-2127-422b-91ae-364da2661108
-
http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2016-3090545.htmlaf854a3a-2127-422b-91ae-364da2661108 Third Party Advisory
-
http://www.oracle.com/technetwork/topics/security/ovmbulletinoct2016-3090547.htmlaf854a3a-2127-422b-91ae-364da2661108 Third Party Advisory
-
http://www.securityfocus.com/bid/92982af854a3a-2127-422b-91ae-364da2661108 Third Party Advisory VDB Entry
-
http://www.securitytracker.com/id/1036690af854a3a-2127-422b-91ae-364da2661108
-
http://www.splunk.com/view/SP-CAAAPSVaf854a3a-2127-422b-91ae-364da2661108 Third Party Advisory
-
http://www.splunk.com/view/SP-CAAAPUEaf854a3a-2127-422b-91ae-364da2661108 Third Party Advisory
-
http://www.ubuntu.com/usn/USN-3087-1af854a3a-2127-422b-91ae-364da2661108
-
http://www.ubuntu.com/usn/USN-3087-2af854a3a-2127-422b-91ae-364da2661108
-
https://bto.bluecoat.com/security-advisory/sa132af854a3a-2127-422b-91ae-364da2661108 Third Party Advisory
-
https://cert-portal.siemens.com/productcert/pdf/ssa-412672.pdfaf854a3a-2127-422b-91ae-364da2661108
-
https://git.openssl.org/?p=openssl.git%3Ba=commit%3Bh=1fb9fdc3027b27d8eb6a1e6a846435b070980770af854a3a-2127-422b-91ae-364da2661108
-
https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA40312af854a3a-2127-422b-91ae-364da2661108 Third Party Advisory
-
https://kc.mcafee.com/corporate/index?page=content&id=SB10215af854a3a-2127-422b-91ae-364da2661108
-
https://security.FreeBSD.org/advisories/FreeBSD-SA-16:26.openssl.ascaf854a3a-2127-422b-91ae-364da2661108
-
https://support.f5.com/csp/article/K59298921af854a3a-2127-422b-91ae-364da2661108
-
https://www.arista.com/en/support/advisories-notices/security-advisories/1749-security-advisory-24af854a3a-2127-422b-91ae-364da2661108
-
https://www.tenable.com/security/tns-2016-16af854a3a-2127-422b-91ae-364da2661108 Third Party Advisory
-
https://www.tenable.com/security/tns-2016-20af854a3a-2127-422b-91ae-364da2661108
-
https://www.tenable.com/security/tns-2016-21af854a3a-2127-422b-91ae-364da2661108
Severity Details
out of 10.0
Low
Key Information
- Published Date
- September 16, 2016
