Critical Severity Vulnerability
This vulnerability has been rated as Critical severity. Immediate action is recommended.
CVE-2016-9843
CriticalVulnerability Description
The crc32_big function in crc32.c in zlib 1.2.8 might allow context-dependent attackers to have unspecified impact via vectors involving big-endian CRC calculation.
CVSS Metrics
Common Vulnerability Scoring System
Vector String:
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Known Affected Software
146 configuration(s) from 7 vendor(s)
cpe:2.3:o:apple:iphone_os:6.1.6:*:*:*:*:*:*:*
cpe:2.3:o:apple:iphone_os:4.2.9:*:*:*:*:*:*:*
cpe:2.3:o:apple:iphone_os:4.2.5:*:*:*:*:*:*:*
cpe:2.3:o:apple:iphone_os:8.1.3:*:*:*:*:*:*:*
cpe:2.3:o:apple:iphone_os:8.0.1:*:*:*:*:*:*:*
cpe:2.3:o:apple:iphone_os:8.3:*:*:*:*:*:*:*
cpe:2.3:o:apple:iphone_os:1.0.2:-:iphone:*:*:*:*:*
cpe:2.3:o:apple:watchos:2.0:*:*:*:*:*:*:*
cpe:2.3:o:apple:iphone_os:10.3.3:*:*:*:*:*:*:*
cpe:2.3:o:apple:iphone_os:8.1.1:*:*:*:*:*:*:*
cpe:2.3:o:apple:watchos:3.2.2:*:*:*:*:*:*:*
cpe:2.3:o:apple:iphone_os:1.1.0:*:*:*:*:*:*:*
cpe:2.3:o:apple:iphone_os:3.1.1:*:*:*:*:ipod_touch:*:*
cpe:2.3:o:apple:iphone_os:2.1.1:*:*:*:*:*:*:*
cpe:2.3:o:apple:iphone_os:9.3.5:*:*:*:*:*:*:*
cpe:2.3:o:apple:iphone_os:1.0.0:*:*:*:*:*:*:*
cpe:2.3:o:apple:iphone_os:7.0.3:*:*:*:*:*:*:*
cpe:2.3:o:apple:iphone_os:4.3.3:*:*:*:*:*:*:*
cpe:2.3:o:apple:watchos:2.0.1:*:*:*:*:*:*:*
cpe:2.3:o:apple:iphone_os:7.0.2:*:*:*:*:*:*:*
cpe:2.3:o:apple:iphone_os:2.0.2:-:iphone:*:*:*:*:*
cpe:2.3:o:apple:watchos:3.2.3:*:*:*:*:*:*:*
cpe:2.3:o:apple:iphone_os:4.3.4:*:*:*:*:*:*:*
cpe:2.3:o:apple:iphone_os:2.1:-:iphone:*:*:*:*:*
cpe:2.3:o:apple:watchos:3.1.1:*:*:*:*:*:*:*
cpe:2.3:o:apple:watchos:2.2.1:*:*:*:*:*:*:*
cpe:2.3:o:apple:watchos:3.0:*:*:*:*:*:*:*
cpe:2.3:o:apple:iphone_os:10.3:*:*:*:*:*:*:*
cpe:2.3:o:apple:iphone_os:10.2.1:*:*:*:*:*:*:*
cpe:2.3:o:apple:iphone_os:7.0.4:*:*:*:*:*:*:*
cpe:2.3:o:apple:iphone_os:1.0.1:-:iphone:*:*:*:*:*
cpe:2.3:o:apple:iphone_os:3.2:*:*:*:*:*:*:*
cpe:2.3:o:apple:iphone_os:7.0:*:*:*:*:*:*:*
cpe:2.3:o:apple:iphone_os:3.1.3:-:iphone:*:*:*:*:*
cpe:2.3:o:apple:iphone_os:9.3.1:*:*:*:*:*:*:*
cpe:2.3:o:apple:iphone_os:10.0.3:*:*:*:*:*:*:*
cpe:2.3:o:apple:iphone_os:9.3.2:*:*:*:*:*:*:*
cpe:2.3:o:apple:iphone_os:10.0.2:*:*:*:*:*:*:*
cpe:2.3:o:apple:iphone_os:3.2.2:*:*:*:*:*:*:*
cpe:2.3:o:apple:iphone_os:9.3:*:*:*:*:*:*:*
cpe:2.3:o:apple:iphone_os:1.1.4:-:iphone:*:*:*:*:*
cpe:2.3:o:apple:iphone_os:2.2:-:iphone:*:*:*:*:*
cpe:2.3:o:apple:iphone_os:3.2.1:*:*:*:*:*:*:*
cpe:2.3:o:apple:watchos:1.0:*:*:*:*:*:*:*
cpe:2.3:o:apple:watchos:3.2:*:*:*:*:*:*:*
cpe:2.3:o:apple:iphone_os:8.4:*:*:*:*:*:*:*
cpe:2.3:o:apple:iphone_os:1.1.2:-:iphone:*:*:*:*:*
cpe:2.3:o:apple:watchos:1.0.1:*:*:*:*:*:*:*
cpe:2.3:o:apple:iphone_os:10.3.4:*:*:*:*:*:*:*
cpe:2.3:o:apple:iphone_os:10.3.1:*:*:*:*:*:*:*
cpe:2.3:o:apple:iphone_os:5.1.1:*:*:*:*:*:*:*
cpe:2.3:o:apple:iphone_os:5.0:*:*:*:*:*:*:*
cpe:2.3:o:apple:watchos:3.1.3:*:*:*:*:*:*:*
cpe:2.3:o:apple:iphone_os:9.3.4:*:*:*:*:*:*:*
cpe:2.3:o:apple:iphone_os:8.2:*:*:*:*:*:*:*
cpe:2.3:o:apple:iphone_os:6.1.5:*:*:*:*:*:*:*
cpe:2.3:o:apple:watchos:2.2:*:*:*:*:*:*:*
cpe:2.3:o:apple:iphone_os:2.2.1:-:iphone:*:*:*:*:*
cpe:2.3:o:apple:iphone_os:9.3.3:*:*:*:*:*:*:*
cpe:2.3:o:apple:iphone_os:8.1.2:*:*:*:*:*:*:*
cpe:2.3:o:apple:iphone_os:6.1.2:*:*:*:*:*:*:*
cpe:2.3:o:apple:iphone_os:7.0.6:*:*:*:*:*:*:*
cpe:2.3:o:apple:iphone_os:8.0:*:*:*:*:*:*:*
cpe:2.3:o:apple:iphone_os:10.1.1:*:*:*:*:*:*:*
cpe:2.3:o:apple:watchos:2.1:*:*:*:*:*:*:*
cpe:2.3:o:apple:iphone_os:9.2:*:*:*:*:*:*:*
cpe:2.3:o:apple:iphone_os:4.0.1:*:*:*:*:*:*:*
cpe:2.3:o:apple:watchos:2.2.2:*:*:*:*:*:*:*
cpe:2.3:o:apple:watchos:3.1:*:*:*:*:*:*:*
cpe:2.3:o:apple:iphone_os:7.1.2:*:*:*:*:*:*:*
cpe:2.3:o:apple:iphone_os:2.0.1:-:iphone:*:*:*:*:*
cpe:2.3:o:apple:iphone_os:9.0:*:*:*:*:*:*:*
cpe:2.3:o:apple:iphone_os:4.2.8:*:*:*:*:*:*:*
cpe:2.3:o:apple:iphone_os:4.2:*:*:*:*:*:*:*
cpe:2.3:o:apple:iphone_os:1.1:*:*:*:*:*:*:*
cpe:2.3:o:apple:iphone_os:10.2:*:*:*:*:*:*:*
cpe:2.3:o:apple:iphone_os:9.0.2:*:*:*:*:*:*:*
cpe:2.3:o:apple:iphone_os:9.3.6:*:*:*:*:*:*:*
cpe:2.3:o:apple:iphone_os:1.1.1:-:iphone:*:*:*:*:*
cpe:2.3:o:apple:iphone_os:6.1.4:*:*:*:*:*:*:*
cpe:2.3:o:apple:iphone_os:6.1:*:*:*:*:*:*:*
cpe:2.3:o:apple:iphone_os:10.0:*:*:*:*:*:*:*
cpe:2.3:o:apple:iphone_os:6.1.3:*:*:*:*:*:*:*
cpe:2.3:o:apple:iphone_os:4.2.10:*:*:*:*:*:*:*
cpe:2.3:o:apple:iphone_os:9.0.1:*:*:*:*:*:*:*
cpe:2.3:o:apple:iphone_os:4.3.5:*:*:*:*:*:*:*
cpe:2.3:o:apple:iphone_os:7.1.1:*:*:*:*:*:*:*
cpe:2.3:o:apple:iphone_os:4.3.0:*:*:*:*:*:*:*
cpe:2.3:o:apple:iphone_os:4.0.2:*:*:*:*:*:*:*
cpe:2.3:o:apple:iphone_os:8.4.1:*:*:*:*:*:*:*
cpe:2.3:o:apple:iphone_os:9.1:*:*:*:*:*:*:*
cpe:2.3:o:apple:iphone_os:4.3.1:*:*:*:*:*:*:*
cpe:2.3:o:apple:iphone_os:8.1:*:*:*:*:*:*:*
cpe:2.3:o:apple:iphone_os:1.0:*:*:*:*:*:*:*
cpe:2.3:o:apple:iphone_os:3.1:*:*:*:*:ipod_touch:*:*
cpe:2.3:o:apple:iphone_os:9.2.1:*:*:*:*:*:*:*
cpe:2.3:o:apple:iphone_os:4.2.1:*:*:*:*:*:*:*
cpe:2.3:o:apple:iphone_os:5.0.1:*:*:*:*:*:*:*
cpe:2.3:o:apple:iphone_os:2.0:*:*:*:*:*:*:*
cpe:2.3:o:apple:iphone_os:1.1.3:-:iphone:*:*:*:*:*
cpe:2.3:o:apple:iphone_os:4.1:*:*:*:*:*:*:*
cpe:2.3:o:apple:iphone_os:5.1:*:*:*:*:*:*:*
cpe:2.3:o:apple:iphone_os:3.0:-:iphone:*:*:*:*:*
cpe:2.3:o:apple:iphone_os:6.0.1:*:*:*:*:*:*:*
cpe:2.3:o:apple:iphone_os:7.0.1:*:*:*:*:*:*:*
cpe:2.3:o:apple:iphone_os:4.3.2:*:*:*:*:*:*:*
cpe:2.3:o:apple:iphone_os:10.0.1:*:*:*:*:*:*:*
cpe:2.3:o:apple:iphone_os:1.1.5:-:iphone:*:*:*:*:*
cpe:2.3:o:apple:iphone_os:4.0:-:iphone:*:*:*:*:*
cpe:2.3:o:apple:iphone_os:10.3.2:*:*:*:*:*:*:*
cpe:2.3:o:apple:iphone_os:8.0.2:*:*:*:*:*:*:*
cpe:2.3:o:apple:iphone_os:6.0.2:*:*:*:*:*:*:*
cpe:2.3:o:apple:iphone_os:10.1:*:*:*:*:*:*:*
cpe:2.3:o:apple:iphone_os:2.0.0:*:*:*:*:*:*:*
cpe:2.3:o:apple:iphone_os:3.0.1:-:ipodtouch:*:*:*:*:*
cpe:2.3:o:apple:iphone_os:7.1:*:*:*:*:*:*:*
cpe:2.3:o:apple:iphone_os:7.0.5:*:*:*:*:*:*:*
cpe:2.3:o:apple:iphone_os:3.1.2:-:iphone:*:*:*:*:*
cpe:2.3:o:apple:iphone_os:4.2.6:*:*:*:*:*:*:*
cpe:2.3:o:apple:iphone_os:6.0:*:*:*:*:*:*:*
cpe:2.3:o:apple:iphone_os:4.2.7:*:*:*:*:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:*:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:esm:*:*:*
cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*
cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:*
cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*
cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*
cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
cpe:2.3:o:opensuse:leap:42.2:*:*:*:*:*:*:*
cpe:2.3:a:oracle:jdk:1.6.0:update8:*:*:*:*:*:*
cpe:2.3:a:oracle:database_server:18c:*:*:*:*:*:*:*
cpe:2.3:a:oracle:jdk:1.7.0:update343_b31:*:*:*:*:*:*
cpe:2.3:a:oracle:jdk:1.8.0:update441:*:*:-:*:*:*
cpe:2.3:a:oracle:jre:1.6.0:update101:*:*:-:*:*:*
cpe:2.3:a:oracle:jre:1.7.0:update261:*:*:*:*:*:*
cpe:2.3:a:oracle:jre:1.8.0:update441:*:*:-:*:*:*
cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:x64:*
cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:x86:*
cpe:2.3:a:redhat:satellite:5.8:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:x64:*
cpe:2.3:o:redhat:enterprise_linux_eus:7.4:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:x64:*
cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:x64:*
cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:x86:*
USN-7959-1
USN-7959-1: klibc vulnerabilities
2025-Mar-CVE-2016-9843
CVE-2016-9843: None
References & Resources
-
http://lists.opensuse.org/opensuse-updates/2016-12/msg00127.htmlsecurity@opentext.com
-
http://lists.opensuse.org/opensuse-updates/2017-01/msg00050.htmlsecurity@opentext.com
-
http://lists.opensuse.org/opensuse-updates/2017-01/msg00053.htmlsecurity@opentext.com
-
http://www.openwall.com/lists/oss-security/2016/12/05/21security@opentext.com
-
http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.htmlsecurity@opentext.com
-
http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.htmlsecurity@opentext.com
-
http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.htmlsecurity@opentext.com
-
http://www.securityfocus.com/bid/95131security@opentext.com
-
http://www.securitytracker.com/id/1039427security@opentext.com
-
http://www.securitytracker.com/id/1041888security@opentext.com
-
https://access.redhat.com/errata/RHSA-2017:1220security@opentext.com
-
https://access.redhat.com/errata/RHSA-2017:1221security@opentext.com
-
https://access.redhat.com/errata/RHSA-2017:1222security@opentext.com
-
https://access.redhat.com/errata/RHSA-2017:2999security@opentext.com
-
https://access.redhat.com/errata/RHSA-2017:3046security@opentext.com
-
https://access.redhat.com/errata/RHSA-2017:3047security@opentext.com
-
https://access.redhat.com/errata/RHSA-2017:3453security@opentext.com
-
https://bugzilla.redhat.com/show_bug.cgi?id=1402351security@opentext.com
-
https://github.com/madler/zlib/commit/d1d577490c15a0c6862473d7576352a9f18ef811security@opentext.com
-
https://lists.debian.org/debian-lts-announce/2019/03/msg00027.htmlsecurity@opentext.com
-
https://lists.debian.org/debian-lts-announce/2020/01/msg00030.htmlsecurity@opentext.com
-
https://security.gentoo.org/glsa/201701-56security@opentext.com
-
https://security.gentoo.org/glsa/202007-54security@opentext.com
-
https://security.netapp.com/advisory/ntap-20181018-0002/security@opentext.com
-
https://support.apple.com/HT208112security@opentext.com
-
https://support.apple.com/HT208113security@opentext.com
-
https://support.apple.com/HT208115security@opentext.com
-
https://support.apple.com/HT208144security@opentext.com
-
https://usn.ubuntu.com/4246-1/security@opentext.com
-
https://usn.ubuntu.com/4292-1/security@opentext.com
-
https://wiki.mozilla.org/MOSS/Secure_Open_Source/Completed#zlibsecurity@opentext.com
-
https://wiki.mozilla.org/images/0/09/Zlib-report.pdfsecurity@opentext.com
-
https://www.oracle.com/security-alerts/cpujul2020.htmlsecurity@opentext.com
-
http://lists.opensuse.org/opensuse-updates/2016-12/msg00127.htmlaf854a3a-2127-422b-91ae-364da2661108
-
http://lists.opensuse.org/opensuse-updates/2017-01/msg00050.htmlaf854a3a-2127-422b-91ae-364da2661108
-
http://lists.opensuse.org/opensuse-updates/2017-01/msg00053.htmlaf854a3a-2127-422b-91ae-364da2661108
-
http://www.openwall.com/lists/oss-security/2016/12/05/21af854a3a-2127-422b-91ae-364da2661108
-
http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.htmlaf854a3a-2127-422b-91ae-364da2661108
-
http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.htmlaf854a3a-2127-422b-91ae-364da2661108
-
http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.htmlaf854a3a-2127-422b-91ae-364da2661108
-
http://www.securityfocus.com/bid/95131af854a3a-2127-422b-91ae-364da2661108
-
http://www.securitytracker.com/id/1039427af854a3a-2127-422b-91ae-364da2661108
-
http://www.securitytracker.com/id/1041888af854a3a-2127-422b-91ae-364da2661108
-
https://access.redhat.com/errata/RHSA-2017:1220af854a3a-2127-422b-91ae-364da2661108
-
https://access.redhat.com/errata/RHSA-2017:1221af854a3a-2127-422b-91ae-364da2661108
-
https://access.redhat.com/errata/RHSA-2017:1222af854a3a-2127-422b-91ae-364da2661108
-
https://access.redhat.com/errata/RHSA-2017:2999af854a3a-2127-422b-91ae-364da2661108
-
https://access.redhat.com/errata/RHSA-2017:3046af854a3a-2127-422b-91ae-364da2661108
-
https://access.redhat.com/errata/RHSA-2017:3047af854a3a-2127-422b-91ae-364da2661108
-
https://access.redhat.com/errata/RHSA-2017:3453af854a3a-2127-422b-91ae-364da2661108
-
https://bugzilla.redhat.com/show_bug.cgi?id=1402351af854a3a-2127-422b-91ae-364da2661108
-
https://github.com/madler/zlib/commit/d1d577490c15a0c6862473d7576352a9f18ef811af854a3a-2127-422b-91ae-364da2661108
-
https://lists.debian.org/debian-lts-announce/2019/03/msg00027.htmlaf854a3a-2127-422b-91ae-364da2661108
-
https://lists.debian.org/debian-lts-announce/2020/01/msg00030.htmlaf854a3a-2127-422b-91ae-364da2661108
-
https://security.gentoo.org/glsa/201701-56af854a3a-2127-422b-91ae-364da2661108
-
https://security.gentoo.org/glsa/202007-54af854a3a-2127-422b-91ae-364da2661108
-
https://security.netapp.com/advisory/ntap-20181018-0002/af854a3a-2127-422b-91ae-364da2661108
-
https://support.apple.com/HT208112af854a3a-2127-422b-91ae-364da2661108
-
https://support.apple.com/HT208113af854a3a-2127-422b-91ae-364da2661108
-
https://support.apple.com/HT208115af854a3a-2127-422b-91ae-364da2661108
-
https://support.apple.com/HT208144af854a3a-2127-422b-91ae-364da2661108
-
https://usn.ubuntu.com/4246-1/af854a3a-2127-422b-91ae-364da2661108
-
https://usn.ubuntu.com/4292-1/af854a3a-2127-422b-91ae-364da2661108
-
https://wiki.mozilla.org/MOSS/Secure_Open_Source/Completed#zlibaf854a3a-2127-422b-91ae-364da2661108
-
https://wiki.mozilla.org/images/0/09/Zlib-report.pdfaf854a3a-2127-422b-91ae-364da2661108
-
https://www.oracle.com/security-alerts/cpujul2020.htmlaf854a3a-2127-422b-91ae-364da2661108
Severity Details
Key Information
- Published Date
- May 23, 2017
