CVE-2016-6302
Low
Low
Medium
High
Critical
CVSS Score
Vulnerability Description
The tls_decrypt_ticket function in ssl/t1_lib.c in OpenSSL before 1.1.0 does not consider the HMAC size during validation of the ticket length, which allows remote attackers to cause a denial of service via a ticket that is too short.
Known Affected Software
34 configuration(s) from 2 vendor(s)
openssl
Version:
1.0.1d
CPE:
cpe:2.3:a:openssl:openssl:1.0.1d:*:*:*:*:*:*:*
openssl
Version:
1.0.2c
CPE:
cpe:2.3:a:openssl:openssl:1.0.2c:*:*:*:*:*:*:*
openssl
Version:
1.0.1b
CPE:
cpe:2.3:a:openssl:openssl:1.0.1b:*:*:*:*:*:*:*
openssl
Version:
1.0.1a
CPE:
cpe:2.3:a:openssl:openssl:1.0.1a:*:*:*:*:*:*:*
openssl
Version:
1.0.2g
CPE:
cpe:2.3:a:openssl:openssl:1.0.2g:*:*:*:*:*:*:*
openssl
Version:
1.0.1k
CPE:
cpe:2.3:a:openssl:openssl:1.0.1k:*:*:*:*:*:*:*
openssl
Version:
1.0.1n
CPE:
cpe:2.3:a:openssl:openssl:1.0.1n:*:*:*:*:*:*:*
openssl
Version:
1.0.1s
CPE:
cpe:2.3:a:openssl:openssl:1.0.1s:*:*:*:*:*:*:*
openssl
Version:
1.0.1q
CPE:
cpe:2.3:a:openssl:openssl:1.0.1q:*:*:*:*:*:*:*
openssl
Version:
1.0.2e
CPE:
cpe:2.3:a:openssl:openssl:1.0.2e:*:*:*:*:*:*:*
openssl
Version:
1.0.2
CPE:
cpe:2.3:a:openssl:openssl:1.0.2:-:*:*:*:*:*:*
openssl
Version:
1.0.1r
CPE:
cpe:2.3:a:openssl:openssl:1.0.1r:*:*:*:*:*:*:*
openssl
Version:
1.0.2d
CPE:
cpe:2.3:a:openssl:openssl:1.0.2d:*:*:*:*:*:*:*
openssl
Version:
1.0.2h
CPE:
cpe:2.3:a:openssl:openssl:1.0.2h:*:*:*:*:*:*:*
openssl
Version:
1.0.1i
CPE:
cpe:2.3:a:openssl:openssl:1.0.1i:*:*:*:*:*:*:*
openssl
Version:
1.0.2a
CPE:
cpe:2.3:a:openssl:openssl:1.0.2a:*:*:*:*:*:*:*
openssl
Version:
1.0.1f
CPE:
cpe:2.3:a:openssl:openssl:1.0.1f:*:*:*:*:*:*:*
openssl
Version:
1.0.1h
CPE:
cpe:2.3:a:openssl:openssl:1.0.1h:*:*:*:*:*:*:*
openssl
Version:
1.0.1j
CPE:
cpe:2.3:a:openssl:openssl:1.0.1j:*:*:*:*:*:*:*
openssl
Version:
1.0.1p
CPE:
cpe:2.3:a:openssl:openssl:1.0.1p:*:*:*:*:*:*:*
openssl
Version:
1.0.1g
CPE:
cpe:2.3:a:openssl:openssl:1.0.1g:*:*:*:*:*:*:*
openssl
Version:
1.0.1e
CPE:
cpe:2.3:a:openssl:openssl:1.0.1e:*:*:*:*:*:*:*
openssl
Version:
1.0.2f
CPE:
cpe:2.3:a:openssl:openssl:1.0.2f:*:*:*:*:*:*:*
openssl
Version:
1.0.1
CPE:
cpe:2.3:a:openssl:openssl:1.0.1:-:*:*:*:*:*:*
openssl
Version:
1.0.1m
CPE:
cpe:2.3:a:openssl:openssl:1.0.1m:*:*:*:*:*:*:*
openssl
Version:
1.0.1l
CPE:
cpe:2.3:a:openssl:openssl:1.0.1l:*:*:*:*:*:*:*
openssl
Version:
1.0.1c
CPE:
cpe:2.3:a:openssl:openssl:1.0.1c:*:*:*:*:*:*:*
openssl
Version:
1.0.1t
CPE:
cpe:2.3:a:openssl:openssl:1.0.1t:*:*:*:*:*:*:*
openssl
Version:
1.0.1o
CPE:
cpe:2.3:a:openssl:openssl:1.0.1o:*:*:*:*:*:*:*
openssl
Version:
1.0.2b
CPE:
cpe:2.3:a:openssl:openssl:1.0.2b:*:*:*:*:*:*:*
solaris
Version:
11.3
CPE:
cpe:2.3:o:oracle:solaris:11.3:*:*:*:*:*:*:*
linux
Version:
7
CPE:
cpe:2.3:o:oracle:linux:7:8:*:*:*:*:*:*
linux
Version:
6
CPE:
cpe:2.3:o:oracle:linux:6:10:*:*:*:*:*:*
solaris
Version:
10
CPE:
cpe:2.3:o:oracle:solaris:10:*:*:*:*:*:sparc:*
This vulnerability affects 34 software configuration(s). Ensure you patch all affected systems.
References & Resources
-
http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10759secalert@redhat.com Third Party Advisory
-
http://rhn.redhat.com/errata/RHSA-2016-1940.htmlsecalert@redhat.com
-
http://www-01.ibm.com/support/docview.wss?uid=swg21995039secalert@redhat.com Third Party Advisory
-
http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.htmlsecalert@redhat.com
-
http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.htmlsecalert@redhat.com
-
http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.htmlsecalert@redhat.com
-
http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.htmlsecalert@redhat.com Patch Third Party Advisory
-
http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.htmlsecalert@redhat.com
-
http://www.oracle.com/technetwork/topics/security/bulletinoct2016-3090566.htmlsecalert@redhat.com Patch Third Party Advisory
-
http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2016-3090545.htmlsecalert@redhat.com Patch Third Party Advisory
-
http://www.oracle.com/technetwork/topics/security/ovmbulletinoct2016-3090547.htmlsecalert@redhat.com Patch Third Party Advisory
-
http://www.securityfocus.com/bid/92628secalert@redhat.com Third Party Advisory VDB Entry
-
http://www.securitytracker.com/id/1036885secalert@redhat.com
-
http://www.splunk.com/view/SP-CAAAPSVsecalert@redhat.com Third Party Advisory
-
http://www.splunk.com/view/SP-CAAAPUEsecalert@redhat.com Third Party Advisory
-
https://access.redhat.com/errata/RHSA-2018:2185secalert@redhat.com
-
https://access.redhat.com/errata/RHSA-2018:2186secalert@redhat.com
-
https://access.redhat.com/errata/RHSA-2018:2187secalert@redhat.com
-
https://bto.bluecoat.com/security-advisory/sa132secalert@redhat.com Third Party Advisory
-
https://cert-portal.siemens.com/productcert/pdf/ssa-412672.pdfsecalert@redhat.com
-
https://git.openssl.org/?p=openssl.git%3Ba=commit%3Bh=e97763c92c655dcf4af2860b3abd2bc4c8a267f9secalert@redhat.com
-
https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA40312secalert@redhat.com Third Party Advisory
-
https://security.FreeBSD.org/advisories/FreeBSD-SA-16:26.openssl.ascsecalert@redhat.com
-
https://www.tenable.com/security/tns-2016-16secalert@redhat.com Third Party Advisory
-
https://www.tenable.com/security/tns-2016-20secalert@redhat.com
-
https://www.tenable.com/security/tns-2016-21secalert@redhat.com
-
http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10759af854a3a-2127-422b-91ae-364da2661108 Third Party Advisory
-
http://rhn.redhat.com/errata/RHSA-2016-1940.htmlaf854a3a-2127-422b-91ae-364da2661108
-
http://www-01.ibm.com/support/docview.wss?uid=swg21995039af854a3a-2127-422b-91ae-364da2661108 Third Party Advisory
-
http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.htmlaf854a3a-2127-422b-91ae-364da2661108
-
http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.htmlaf854a3a-2127-422b-91ae-364da2661108
-
http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.htmlaf854a3a-2127-422b-91ae-364da2661108
-
http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.htmlaf854a3a-2127-422b-91ae-364da2661108 Patch Third Party Advisory
-
http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.htmlaf854a3a-2127-422b-91ae-364da2661108
-
http://www.oracle.com/technetwork/topics/security/bulletinoct2016-3090566.htmlaf854a3a-2127-422b-91ae-364da2661108 Patch Third Party Advisory
-
http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2016-3090545.htmlaf854a3a-2127-422b-91ae-364da2661108 Patch Third Party Advisory
-
http://www.oracle.com/technetwork/topics/security/ovmbulletinoct2016-3090547.htmlaf854a3a-2127-422b-91ae-364da2661108 Patch Third Party Advisory
-
http://www.securityfocus.com/bid/92628af854a3a-2127-422b-91ae-364da2661108 Third Party Advisory VDB Entry
-
http://www.securitytracker.com/id/1036885af854a3a-2127-422b-91ae-364da2661108
-
http://www.splunk.com/view/SP-CAAAPSVaf854a3a-2127-422b-91ae-364da2661108 Third Party Advisory
-
http://www.splunk.com/view/SP-CAAAPUEaf854a3a-2127-422b-91ae-364da2661108 Third Party Advisory
-
https://access.redhat.com/errata/RHSA-2018:2185af854a3a-2127-422b-91ae-364da2661108
-
https://access.redhat.com/errata/RHSA-2018:2186af854a3a-2127-422b-91ae-364da2661108
-
https://access.redhat.com/errata/RHSA-2018:2187af854a3a-2127-422b-91ae-364da2661108
-
https://bto.bluecoat.com/security-advisory/sa132af854a3a-2127-422b-91ae-364da2661108 Third Party Advisory
-
https://cert-portal.siemens.com/productcert/pdf/ssa-412672.pdfaf854a3a-2127-422b-91ae-364da2661108
-
https://git.openssl.org/?p=openssl.git%3Ba=commit%3Bh=e97763c92c655dcf4af2860b3abd2bc4c8a267f9af854a3a-2127-422b-91ae-364da2661108
-
https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA40312af854a3a-2127-422b-91ae-364da2661108 Third Party Advisory
-
https://security.FreeBSD.org/advisories/FreeBSD-SA-16:26.openssl.ascaf854a3a-2127-422b-91ae-364da2661108
-
https://www.tenable.com/security/tns-2016-16af854a3a-2127-422b-91ae-364da2661108 Third Party Advisory
-
https://www.tenable.com/security/tns-2016-20af854a3a-2127-422b-91ae-364da2661108
-
https://www.tenable.com/security/tns-2016-21af854a3a-2127-422b-91ae-364da2661108
Severity Details
out of 10.0
Low
Weakness Type (CWE)
CWE-20
Top 25 #14
Improper Input Validation
- Description
- The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.
- Exploit Likelihood
- High
- Typical Severity
- High
- Abstraction Level
- Class
Key Information
- Published Date
- September 16, 2016
