CVE-2016-2182
Low
Low
Medium
High
Critical
CVSS Score
Vulnerability Description
The BN_bn2dec function in crypto/bn/bn_print.c in OpenSSL before 1.1.0 does not properly validate division results, which allows remote attackers to cause a denial of service (out-of-bounds write and application crash) or possibly have unspecified other impact via unknown vectors.
Known Affected Software
37 configuration(s) from 3 vendor(s)
icewall_sso_agent_option
Version:
10.0
CPE:
cpe:2.3:a:hp:icewall_sso_agent_option:10.0:*:*:*:*:*:*:*
icewall_sso
Version:
10.0
CPE:
cpe:2.3:a:hp:icewall_sso:10.0:p9:*:*:certd:*:*:*
icewall_mcrp
Version:
3.0
CPE:
cpe:2.3:a:hp:icewall_mcrp:3.0:*:*:*:*:*:*:*
icewall_federation_agent
Version:
3.0
CPE:
cpe:2.3:a:hp:icewall_federation_agent:3.0:*:*:*:*:*:*:*
openssl
Version:
1.0.1d
CPE:
cpe:2.3:a:openssl:openssl:1.0.1d:*:*:*:*:*:*:*
openssl
Version:
1.0.2c
CPE:
cpe:2.3:a:openssl:openssl:1.0.2c:*:*:*:*:*:*:*
openssl
Version:
1.0.1b
CPE:
cpe:2.3:a:openssl:openssl:1.0.1b:*:*:*:*:*:*:*
openssl
Version:
1.0.1a
CPE:
cpe:2.3:a:openssl:openssl:1.0.1a:*:*:*:*:*:*:*
openssl
Version:
1.0.2g
CPE:
cpe:2.3:a:openssl:openssl:1.0.2g:*:*:*:*:*:*:*
openssl
Version:
1.0.1k
CPE:
cpe:2.3:a:openssl:openssl:1.0.1k:*:*:*:*:*:*:*
openssl
Version:
1.0.1n
CPE:
cpe:2.3:a:openssl:openssl:1.0.1n:*:*:*:*:*:*:*
openssl
Version:
1.0.1s
CPE:
cpe:2.3:a:openssl:openssl:1.0.1s:*:*:*:*:*:*:*
openssl
Version:
1.0.1q
CPE:
cpe:2.3:a:openssl:openssl:1.0.1q:*:*:*:*:*:*:*
openssl
Version:
1.0.2e
CPE:
cpe:2.3:a:openssl:openssl:1.0.2e:*:*:*:*:*:*:*
openssl
Version:
1.0.2
CPE:
cpe:2.3:a:openssl:openssl:1.0.2:-:*:*:*:*:*:*
openssl
Version:
1.0.1r
CPE:
cpe:2.3:a:openssl:openssl:1.0.1r:*:*:*:*:*:*:*
openssl
Version:
1.0.2d
CPE:
cpe:2.3:a:openssl:openssl:1.0.2d:*:*:*:*:*:*:*
openssl
Version:
1.0.2h
CPE:
cpe:2.3:a:openssl:openssl:1.0.2h:*:*:*:*:*:*:*
openssl
Version:
1.0.1i
CPE:
cpe:2.3:a:openssl:openssl:1.0.1i:*:*:*:*:*:*:*
openssl
Version:
1.0.2a
CPE:
cpe:2.3:a:openssl:openssl:1.0.2a:*:*:*:*:*:*:*
openssl
Version:
1.0.1f
CPE:
cpe:2.3:a:openssl:openssl:1.0.1f:*:*:*:*:*:*:*
openssl
Version:
1.0.1h
CPE:
cpe:2.3:a:openssl:openssl:1.0.1h:*:*:*:*:*:*:*
openssl
Version:
1.0.1j
CPE:
cpe:2.3:a:openssl:openssl:1.0.1j:*:*:*:*:*:*:*
openssl
Version:
1.0.1p
CPE:
cpe:2.3:a:openssl:openssl:1.0.1p:*:*:*:*:*:*:*
openssl
Version:
1.0.1g
CPE:
cpe:2.3:a:openssl:openssl:1.0.1g:*:*:*:*:*:*:*
openssl
Version:
1.0.1e
CPE:
cpe:2.3:a:openssl:openssl:1.0.1e:*:*:*:*:*:*:*
openssl
Version:
1.0.2f
CPE:
cpe:2.3:a:openssl:openssl:1.0.2f:*:*:*:*:*:*:*
openssl
Version:
1.0.1
CPE:
cpe:2.3:a:openssl:openssl:1.0.1:-:*:*:*:*:*:*
openssl
Version:
1.0.1m
CPE:
cpe:2.3:a:openssl:openssl:1.0.1m:*:*:*:*:*:*:*
openssl
Version:
1.0.1l
CPE:
cpe:2.3:a:openssl:openssl:1.0.1l:*:*:*:*:*:*:*
openssl
Version:
1.0.1c
CPE:
cpe:2.3:a:openssl:openssl:1.0.1c:*:*:*:*:*:*:*
openssl
Version:
1.0.1t
CPE:
cpe:2.3:a:openssl:openssl:1.0.1t:*:*:*:*:*:*:*
openssl
Version:
1.0.1o
CPE:
cpe:2.3:a:openssl:openssl:1.0.1o:*:*:*:*:*:*:*
openssl
Version:
1.0.2b
CPE:
cpe:2.3:a:openssl:openssl:1.0.2b:*:*:*:*:*:*:*
linux
Version:
5
CPE:
cpe:2.3:o:oracle:linux:5:-:*:*:*:*:*:*
linux
Version:
7
CPE:
cpe:2.3:o:oracle:linux:7:8:*:*:*:*:*:*
linux
Version:
6
CPE:
cpe:2.3:o:oracle:linux:6:10:*:*:*:*:*:*
This vulnerability affects 37 software configuration(s). Ensure you patch all affected systems.
References & Resources
-
http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10759secalert@redhat.com Third Party Advisory
-
http://lists.opensuse.org/opensuse-security-announce/2016-09/msg00022.htmlsecalert@redhat.com
-
http://lists.opensuse.org/opensuse-security-announce/2016-09/msg00023.htmlsecalert@redhat.com
-
http://lists.opensuse.org/opensuse-security-announce/2016-09/msg00024.htmlsecalert@redhat.com
-
http://lists.opensuse.org/opensuse-security-announce/2016-09/msg00031.htmlsecalert@redhat.com
-
http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00005.htmlsecalert@redhat.com
-
http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00011.htmlsecalert@redhat.com
-
http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00012.htmlsecalert@redhat.com
-
http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00029.htmlsecalert@redhat.com
-
http://lists.opensuse.org/opensuse-security-announce/2017-10/msg00010.htmlsecalert@redhat.com
-
http://lists.opensuse.org/opensuse-security-announce/2017-10/msg00011.htmlsecalert@redhat.com
-
http://lists.opensuse.org/opensuse-security-announce/2018-02/msg00032.htmlsecalert@redhat.com
-
http://rhn.redhat.com/errata/RHSA-2016-1940.htmlsecalert@redhat.com
-
http://seclists.org/fulldisclosure/2017/Jul/31secalert@redhat.com
-
http://www-01.ibm.com/support/docview.wss?uid=swg21995039secalert@redhat.com Third Party Advisory
-
http://www.debian.org/security/2016/dsa-3673secalert@redhat.com
-
http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20170322-01-openssl-ensecalert@redhat.com
-
http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.htmlsecalert@redhat.com
-
http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.htmlsecalert@redhat.com
-
http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.htmlsecalert@redhat.com
-
http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.htmlsecalert@redhat.com Third Party Advisory
-
http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.htmlsecalert@redhat.com
-
http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2016-3090545.htmlsecalert@redhat.com Third Party Advisory
-
http://www.oracle.com/technetwork/topics/security/ovmbulletinoct2016-3090547.htmlsecalert@redhat.com Third Party Advisory
-
http://www.securityfocus.com/bid/92557secalert@redhat.com Third Party Advisory VDB Entry
-
http://www.securitytracker.com/id/1036688secalert@redhat.com
-
http://www.securitytracker.com/id/1037968secalert@redhat.com
-
http://www.splunk.com/view/SP-CAAAPSVsecalert@redhat.com Third Party Advisory
-
http://www.splunk.com/view/SP-CAAAPUEsecalert@redhat.com Third Party Advisory
-
http://www.ubuntu.com/usn/USN-3087-1secalert@redhat.com
-
http://www.ubuntu.com/usn/USN-3087-2secalert@redhat.com
-
https://access.redhat.com/errata/RHSA-2018:2185secalert@redhat.com
-
https://access.redhat.com/errata/RHSA-2018:2186secalert@redhat.com
-
https://access.redhat.com/errata/RHSA-2018:2187secalert@redhat.com
-
https://bto.bluecoat.com/security-advisory/sa132secalert@redhat.com Third Party Advisory
-
https://cert-portal.siemens.com/productcert/pdf/ssa-412672.pdfsecalert@redhat.com
-
https://git.openssl.org/?p=openssl.git%3Ba=commit%3Bh=07bed46f332fce8c1d157689a2cdf915a982ae34secalert@redhat.com
-
https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c05302448secalert@redhat.com
-
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05302448secalert@redhat.com Third Party Advisory
-
https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA40312secalert@redhat.com Third Party Advisory
-
https://kc.mcafee.com/corporate/index?page=content&id=SB10171secalert@redhat.com Third Party Advisory
-
https://kc.mcafee.com/corporate/index?page=content&id=SB10215secalert@redhat.com
-
https://security.FreeBSD.org/advisories/FreeBSD-SA-16:26.openssl.ascsecalert@redhat.com
-
https://source.android.com/security/bulletin/2017-03-01secalert@redhat.com
-
https://source.android.com/security/bulletin/2017-03-01.htmlsecalert@redhat.com
-
https://support.f5.com/csp/article/K01276005secalert@redhat.com
-
https://support.hpe.com/hpsc/doc/public/display?docLocale=en&docId=emr_na-hpesbhf03856en_ussecalert@redhat.com
-
https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03856en_ussecalert@redhat.com
-
https://www.arista.com/en/support/advisories-notices/security-advisories/1749-security-advisory-24secalert@redhat.com
-
https://www.tenable.com/security/tns-2016-16secalert@redhat.com Third Party Advisory
-
https://www.tenable.com/security/tns-2016-20secalert@redhat.com
-
https://www.tenable.com/security/tns-2016-21secalert@redhat.com
-
http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10759af854a3a-2127-422b-91ae-364da2661108 Third Party Advisory
-
http://lists.opensuse.org/opensuse-security-announce/2016-09/msg00022.htmlaf854a3a-2127-422b-91ae-364da2661108
-
http://lists.opensuse.org/opensuse-security-announce/2016-09/msg00023.htmlaf854a3a-2127-422b-91ae-364da2661108
-
http://lists.opensuse.org/opensuse-security-announce/2016-09/msg00024.htmlaf854a3a-2127-422b-91ae-364da2661108
-
http://lists.opensuse.org/opensuse-security-announce/2016-09/msg00031.htmlaf854a3a-2127-422b-91ae-364da2661108
-
http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00005.htmlaf854a3a-2127-422b-91ae-364da2661108
-
http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00011.htmlaf854a3a-2127-422b-91ae-364da2661108
-
http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00012.htmlaf854a3a-2127-422b-91ae-364da2661108
-
http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00029.htmlaf854a3a-2127-422b-91ae-364da2661108
-
http://lists.opensuse.org/opensuse-security-announce/2017-10/msg00010.htmlaf854a3a-2127-422b-91ae-364da2661108
-
http://lists.opensuse.org/opensuse-security-announce/2017-10/msg00011.htmlaf854a3a-2127-422b-91ae-364da2661108
-
http://lists.opensuse.org/opensuse-security-announce/2018-02/msg00032.htmlaf854a3a-2127-422b-91ae-364da2661108
-
http://rhn.redhat.com/errata/RHSA-2016-1940.htmlaf854a3a-2127-422b-91ae-364da2661108
-
http://seclists.org/fulldisclosure/2017/Jul/31af854a3a-2127-422b-91ae-364da2661108
-
http://www-01.ibm.com/support/docview.wss?uid=swg21995039af854a3a-2127-422b-91ae-364da2661108 Third Party Advisory
-
http://www.debian.org/security/2016/dsa-3673af854a3a-2127-422b-91ae-364da2661108
-
http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20170322-01-openssl-enaf854a3a-2127-422b-91ae-364da2661108
-
http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.htmlaf854a3a-2127-422b-91ae-364da2661108
-
http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.htmlaf854a3a-2127-422b-91ae-364da2661108
-
http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.htmlaf854a3a-2127-422b-91ae-364da2661108
-
http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.htmlaf854a3a-2127-422b-91ae-364da2661108 Third Party Advisory
-
http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.htmlaf854a3a-2127-422b-91ae-364da2661108
-
http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2016-3090545.htmlaf854a3a-2127-422b-91ae-364da2661108 Third Party Advisory
-
http://www.oracle.com/technetwork/topics/security/ovmbulletinoct2016-3090547.htmlaf854a3a-2127-422b-91ae-364da2661108 Third Party Advisory
-
http://www.securityfocus.com/bid/92557af854a3a-2127-422b-91ae-364da2661108 Third Party Advisory VDB Entry
-
http://www.securitytracker.com/id/1036688af854a3a-2127-422b-91ae-364da2661108
-
http://www.securitytracker.com/id/1037968af854a3a-2127-422b-91ae-364da2661108
-
http://www.splunk.com/view/SP-CAAAPSVaf854a3a-2127-422b-91ae-364da2661108 Third Party Advisory
-
http://www.splunk.com/view/SP-CAAAPUEaf854a3a-2127-422b-91ae-364da2661108 Third Party Advisory
-
http://www.ubuntu.com/usn/USN-3087-1af854a3a-2127-422b-91ae-364da2661108
-
http://www.ubuntu.com/usn/USN-3087-2af854a3a-2127-422b-91ae-364da2661108
-
https://access.redhat.com/errata/RHSA-2018:2185af854a3a-2127-422b-91ae-364da2661108
-
https://access.redhat.com/errata/RHSA-2018:2186af854a3a-2127-422b-91ae-364da2661108
-
https://access.redhat.com/errata/RHSA-2018:2187af854a3a-2127-422b-91ae-364da2661108
-
https://bto.bluecoat.com/security-advisory/sa132af854a3a-2127-422b-91ae-364da2661108 Third Party Advisory
-
https://cert-portal.siemens.com/productcert/pdf/ssa-412672.pdfaf854a3a-2127-422b-91ae-364da2661108
-
https://git.openssl.org/?p=openssl.git%3Ba=commit%3Bh=07bed46f332fce8c1d157689a2cdf915a982ae34af854a3a-2127-422b-91ae-364da2661108
-
https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c05302448af854a3a-2127-422b-91ae-364da2661108
-
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05302448af854a3a-2127-422b-91ae-364da2661108 Third Party Advisory
-
https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA40312af854a3a-2127-422b-91ae-364da2661108 Third Party Advisory
-
https://kc.mcafee.com/corporate/index?page=content&id=SB10171af854a3a-2127-422b-91ae-364da2661108 Third Party Advisory
-
https://kc.mcafee.com/corporate/index?page=content&id=SB10215af854a3a-2127-422b-91ae-364da2661108
-
https://security.FreeBSD.org/advisories/FreeBSD-SA-16:26.openssl.ascaf854a3a-2127-422b-91ae-364da2661108
-
https://source.android.com/security/bulletin/2017-03-01af854a3a-2127-422b-91ae-364da2661108
-
https://source.android.com/security/bulletin/2017-03-01.htmlaf854a3a-2127-422b-91ae-364da2661108
-
https://support.f5.com/csp/article/K01276005af854a3a-2127-422b-91ae-364da2661108
-
https://support.hpe.com/hpsc/doc/public/display?docLocale=en&docId=emr_na-hpesbhf03856en_usaf854a3a-2127-422b-91ae-364da2661108
-
https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03856en_usaf854a3a-2127-422b-91ae-364da2661108
-
https://www.arista.com/en/support/advisories-notices/security-advisories/1749-security-advisory-24af854a3a-2127-422b-91ae-364da2661108
-
https://www.tenable.com/security/tns-2016-16af854a3a-2127-422b-91ae-364da2661108 Third Party Advisory
-
https://www.tenable.com/security/tns-2016-20af854a3a-2127-422b-91ae-364da2661108
-
https://www.tenable.com/security/tns-2016-21af854a3a-2127-422b-91ae-364da2661108
Severity Details
out of 10.0
Low
Weakness Type (CWE)
CWE-787
Top 25 #2
Out-of-bounds Write
- Description
- The product writes data past the end, or before the beginning, of the intended buffer.
- Exploit Likelihood
- High
- Typical Severity
- High
- Abstraction Level
- Base
Key Information
- Published Date
- September 16, 2016
