BDU:2022-02558

Vulnerability from fstec - Published: 20.06.2016
VLAI Severity ?
Title
Уязвимость функции dsa_sign_setup библиотеки OpenSSL , связанная с раскрытием защищаемой информации, позволяющая нарушителю обойти криптографические механизмы защиты шифрования
Description
Уязвимость функции dsa_sign_setup библиотеки OpenSSL связана с раскрытием защищаемой информации. Эксплуатация уязвимости может позволить нарушителю обойти криптографические механизмы защиты шифрования
Vendor
OpenSSL Software Foundation, Red Hat Inc., Canonical Ltd., Сообщество свободного программного обеспечения, Novell Inc.
Software Name
OpenSSL, Red Hat Enterprise Linux, Ubuntu, Debian GNU/Linux, OpenSUSE Leap
Software Version
1.0.1n (OpenSSL), 1.0.1o (OpenSSL), 1.0.2b (OpenSSL), 1.0.2c (OpenSSL), 1.0.1m (OpenSSL), 1.0.2a (OpenSSL), 6 (Red Hat Enterprise Linux), 7 (Red Hat Enterprise Linux), 12.04 (Ubuntu), 9 (Debian GNU/Linux), 1.0.2 (OpenSSL), 1.0.2h (OpenSSL), 1.0.2g (OpenSSL), 1.0.2f (OpenSSL), 1.0.2e (OpenSSL), 1.0.2d (OpenSSL), 15.0 (OpenSUSE Leap), 14.04 ESM (Ubuntu), 8 (Debian GNU/Linux), 10 (Debian GNU/Linux), 7 (Debian GNU/Linux), 16.04 ESM (Ubuntu), 11 (Debian GNU/Linux), 1.0.1c (OpenSSL), 1.0.1d (OpenSSL), 1.0.1l (OpenSSL), 1.0.1t (OpenSSL), 1.0.1e (OpenSSL), 1.0.1f (OpenSSL), 1.0.1a (OpenSSL), 1.0.1b (OpenSSL), 1.0.1i (OpenSSL), 1.0.1j (OpenSSL), 1.0.1k (OpenSSL), 1.0.1r (OpenSSL), 1.0.1s (OpenSSL), 1.0.1 (OpenSSL), 1.0.1g (OpenSSL), 1.0.1h (OpenSSL), 1.0.1p (OpenSSL), 1.0.1q (OpenSSL)
Possible Mitigations
Использование рекомендаций: http://www.openwall.com/lists/oss-security/2016/06/08/2 https://git.openssl.org/?p=openssl.git;a=commit;h=399944622df7bd81af62e67ea967c470534090e2 https://bugzilla.redhat.com/show_bug.cgi?id=1343400 Для программных продуктов Novell Inc.: https://www.suse.com/security/cve/CVE-2016-2178 Для программных продуктов Red Hat Inc.: https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-2178.xml Для Ubuntu: https://ubuntu.com/security/CVE-2016-2178 Для Debian GNU/Linux: https://security-tracker.debian.org/tracker/CVE-2016-2178
Reference
http://eprint.iacr.org/2016/594.pdf http://www.openwall.com/lists/oss-security/2016/06/09/8 http://www.openwall.com/lists/oss-security/2016/06/08/2 https://git.openssl.org/?p=openssl.git;a=commit;h=399944622df7bd81af62e67ea967c470534090e2 https://bugzilla.redhat.com/show_bug.cgi?id=1343400 http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00013.html https://nodejs.org/en/blog/vulnerability/september-2016-security-releases/ https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05302448 http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html http://www.oracle.com/technetwork/topics/security/ovmbulletinoct2016-3090547.html http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2016-3090545.html http://www.securityfocus.com/bid/91081 http://www.securitytracker.com/id/1036054 http://www.splunk.com/view/SP-CAAAPUE http://www.splunk.com/view/SP-CAAAPSV https://security.gentoo.org/glsa/201612-16 https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA40312 https://bto.bluecoat.com/security-advisory/sa132 http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10759 https://www.tenable.com/security/tns-2016-16 http://www-01.ibm.com/support/docview.wss?uid=swg21995039 http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html https://www.tenable.com/security/tns-2016-21 https://www.tenable.com/security/tns-2016-20 https://security.FreeBSD.org/advisories/FreeBSD-SA-16:26.openssl.asc https://access.redhat.com/errata/RHSA-2017:1658 https://access.redhat.com/errata/RHSA-2017:0194 https://access.redhat.com/errata/RHSA-2017:0193 http://rhn.redhat.com/errata/RHSA-2017-1659.html http://rhn.redhat.com/errata/RHSA-2016-2957.html http://rhn.redhat.com/errata/RHSA-2016-1940.html http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03856en_us https://kc.mcafee.com/corporate/index?page=content&id=SB10215 http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00005.html http://www.debian.org/security/2016/dsa-3673 http://lists.opensuse.org/opensuse-security-announce/2016-09/msg00024.html https://support.f5.com/csp/article/K53084033 https://support.hpe.com/hpsc/doc/public/display?docLocale=en&docId=emr_na-hpesbhf03856en_us http://www.openwall.com/lists/oss-security/2016/06/08/12 http://www.openwall.com/lists/oss-security/2016/06/08/11 http://lists.opensuse.org/opensuse-security-announce/2017-10/msg00010.html http://www.openwall.com/lists/oss-security/2016/06/08/10 http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00029.html http://www.openwall.com/lists/oss-security/2016/06/08/6 http://www.openwall.com/lists/oss-security/2016/06/08/5 http://www.openwall.com/lists/oss-security/2016/06/08/4 https://www.arista.com/en/support/advisories-notices/security-advisories/1749-security-advisory-24 http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00012.html http://www.openwall.com/lists/oss-security/2016/06/08/8 http://www.openwall.com/lists/oss-security/2016/06/08/7 http://lists.opensuse.org/opensuse-security-announce/2018-02/msg00032.html http://www.ubuntu.com/usn/USN-3087-2 http://lists.opensuse.org/opensuse-security-announce/2016-09/msg00023.html http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00011.html http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20170322-01-openssl-en http://www.ubuntu.com/usn/USN-3087-1 http://lists.opensuse.org/opensuse-security-announce/2016-09/msg00031.html http://lists.opensuse.org/opensuse-security-announce/2017-10/msg00011.html http://seclists.org/fulldisclosure/2017/Jul/31 http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00021.html http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160927-openssl https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c05302448 http://lists.opensuse.org/opensuse-security-announce/2016-09/msg00022.html http://www.openwall.com/lists/oss-security/2016/06/09/2
CWE
CWE-200

{
  "CVSS 2.0": "AV:L/AC:L/Au:S/C:C/I:N/A:N",
  "CVSS 3.0": "AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
  "CVSS 4.0": null,
  "remediation_\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440": null,
  "remediation_\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435": null,
  "\u0412\u0435\u043d\u0434\u043e\u0440 \u041f\u041e": "OpenSSL Software Foundation, Red Hat Inc., Canonical Ltd., \u0421\u043e\u043e\u0431\u0449\u0435\u0441\u0442\u0432\u043e \u0441\u0432\u043e\u0431\u043e\u0434\u043d\u043e\u0433\u043e \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f, Novell Inc.",
  "\u0412\u0435\u0440\u0441\u0438\u044f \u041f\u041e": "1.0.1n (OpenSSL), 1.0.1o (OpenSSL), 1.0.2b (OpenSSL), 1.0.2c (OpenSSL), 1.0.1m (OpenSSL), 1.0.2a (OpenSSL), 6 (Red Hat Enterprise Linux), 7 (Red Hat Enterprise Linux), 12.04 (Ubuntu), 9 (Debian GNU/Linux), 1.0.2 (OpenSSL), 1.0.2h (OpenSSL), 1.0.2g (OpenSSL), 1.0.2f (OpenSSL), 1.0.2e (OpenSSL), 1.0.2d (OpenSSL), 15.0 (OpenSUSE Leap), 14.04 ESM (Ubuntu), 8 (Debian GNU/Linux), 10 (Debian GNU/Linux), 7 (Debian GNU/Linux), 16.04 ESM (Ubuntu), 11 (Debian GNU/Linux), 1.0.1c (OpenSSL), 1.0.1d (OpenSSL), 1.0.1l (OpenSSL), 1.0.1t (OpenSSL), 1.0.1e (OpenSSL), 1.0.1f (OpenSSL), 1.0.1a (OpenSSL), 1.0.1b (OpenSSL), 1.0.1i (OpenSSL), 1.0.1j (OpenSSL), 1.0.1k (OpenSSL), 1.0.1r (OpenSSL), 1.0.1s (OpenSSL), 1.0.1 (OpenSSL), 1.0.1g (OpenSSL), 1.0.1h (OpenSSL), 1.0.1p (OpenSSL), 1.0.1q (OpenSSL)",
  "\u0412\u043e\u0437\u043c\u043e\u0436\u043d\u044b\u0435 \u043c\u0435\u0440\u044b \u043f\u043e \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u044e": "\u0418\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u0435 \u0440\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u0430\u0446\u0438\u0439:\nhttp://www.openwall.com/lists/oss-security/2016/06/08/2\n\nhttps://git.openssl.org/?p=openssl.git;a=commit;h=399944622df7bd81af62e67ea967c470534090e2\n\nhttps://bugzilla.redhat.com/show_bug.cgi?id=1343400\n\n\u0414\u043b\u044f \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u044b\u0445 \u043f\u0440\u043e\u0434\u0443\u043a\u0442\u043e\u0432 Novell Inc.:\nhttps://www.suse.com/security/cve/CVE-2016-2178\n\n\u0414\u043b\u044f \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u044b\u0445 \u043f\u0440\u043e\u0434\u0443\u043a\u0442\u043e\u0432 Red Hat Inc.:\nhttps://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-2178.xml\n\n\u0414\u043b\u044f Ubuntu:\nhttps://ubuntu.com/security/CVE-2016-2178\n\n\u0414\u043b\u044f Debian GNU/Linux:\nhttps://security-tracker.debian.org/tracker/CVE-2016-2178",
  "\u0414\u0430\u0442\u0430 \u0432\u044b\u044f\u0432\u043b\u0435\u043d\u0438\u044f": "20.06.2016",
  "\u0414\u0430\u0442\u0430 \u043f\u043e\u0441\u043b\u0435\u0434\u043d\u0435\u0433\u043e \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u044f": "25.04.2022",
  "\u0414\u0430\u0442\u0430 \u043f\u0443\u0431\u043b\u0438\u043a\u0430\u0446\u0438\u0438": "25.04.2022",
  "\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440": "BDU:2022-02558",
  "\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440\u044b \u0434\u0440\u0443\u0433\u0438\u0445 \u0441\u0438\u0441\u0442\u0435\u043c \u043e\u043f\u0438\u0441\u0430\u043d\u0438\u0439 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "CVE-2016-2178",
  "\u0418\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u044f \u043e\u0431 \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0430",
  "\u041a\u043b\u0430\u0441\u0441 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u043a\u043e\u0434\u0430",
  "\u041d\u0430\u0437\u0432\u0430\u043d\u0438\u0435 \u041f\u041e": "OpenSSL, Red Hat Enterprise Linux, Ubuntu, Debian GNU/Linux, OpenSUSE Leap",
  "\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435 \u041e\u0421 \u0438 \u0442\u0438\u043f \u0430\u043f\u043f\u0430\u0440\u0430\u0442\u043d\u043e\u0439 \u043f\u043b\u0430\u0442\u0444\u043e\u0440\u043c\u044b": "Red Hat Inc. Red Hat Enterprise Linux 6 , Red Hat Inc. Red Hat Enterprise Linux 7 , Canonical Ltd. Ubuntu 12.04 , \u0421\u043e\u043e\u0431\u0449\u0435\u0441\u0442\u0432\u043e \u0441\u0432\u043e\u0431\u043e\u0434\u043d\u043e\u0433\u043e \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f Debian GNU/Linux 9 , Novell Inc. OpenSUSE Leap 15.0 , Canonical Ltd. Ubuntu 14.04 ESM , \u0421\u043e\u043e\u0431\u0449\u0435\u0441\u0442\u0432\u043e \u0441\u0432\u043e\u0431\u043e\u0434\u043d\u043e\u0433\u043e \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f Debian GNU/Linux 8 , \u0421\u043e\u043e\u0431\u0449\u0435\u0441\u0442\u0432\u043e \u0441\u0432\u043e\u0431\u043e\u0434\u043d\u043e\u0433\u043e \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f Debian GNU/Linux 10 , \u0421\u043e\u043e\u0431\u0449\u0435\u0441\u0442\u0432\u043e \u0441\u0432\u043e\u0431\u043e\u0434\u043d\u043e\u0433\u043e \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f Debian GNU/Linux 7 , Canonical Ltd. Ubuntu 16.04 ESM , \u0421\u043e\u043e\u0431\u0449\u0435\u0441\u0442\u0432\u043e \u0441\u0432\u043e\u0431\u043e\u0434\u043d\u043e\u0433\u043e \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f Debian GNU/Linux 11 ",
  "\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0444\u0443\u043d\u043a\u0446\u0438\u0438 dsa_sign_setup \u0431\u0438\u0431\u043b\u0438\u043e\u0442\u0435\u043a\u0438 OpenSSL , \u0441\u0432\u044f\u0437\u0430\u043d\u043d\u0430\u044f \u0441 \u0440\u0430\u0441\u043a\u0440\u044b\u0442\u0438\u0435\u043c \u0437\u0430\u0449\u0438\u0449\u0430\u0435\u043c\u043e\u0439 \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u0438, \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u044e\u0449\u0430\u044f \u043d\u0430\u0440\u0443\u0448\u0438\u0442\u0435\u043b\u044e \u043e\u0431\u043e\u0439\u0442\u0438 \u043a\u0440\u0438\u043f\u0442\u043e\u0433\u0440\u0430\u0444\u0438\u0447\u0435\u0441\u043a\u0438\u0435 \u043c\u0435\u0445\u0430\u043d\u0438\u0437\u043c\u044b \u0437\u0430\u0449\u0438\u0442\u044b \u0448\u0438\u0444\u0440\u043e\u0432\u0430\u043d\u0438\u044f",
  "\u041d\u0430\u043b\u0438\u0447\u0438\u0435 \u044d\u043a\u0441\u043f\u043b\u043e\u0439\u0442\u0430": "\u0414\u0430\u043d\u043d\u044b\u0435 \u0443\u0442\u043e\u0447\u043d\u044f\u044e\u0442\u0441\u044f",
  "\u041e\u043f\u0438\u0441\u0430\u043d\u0438\u0435 \u043e\u0448\u0438\u0431\u043a\u0438 CWE": "\u0420\u0430\u0441\u043a\u0440\u044b\u0442\u0438\u0435 \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u0438 (CWE-200)",
  "\u041e\u043f\u0438\u0441\u0430\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0444\u0443\u043d\u043a\u0446\u0438\u0438 dsa_sign_setup \u0431\u0438\u0431\u043b\u0438\u043e\u0442\u0435\u043a\u0438 OpenSSL \u0441\u0432\u044f\u0437\u0430\u043d\u0430 \u0441 \u0440\u0430\u0441\u043a\u0440\u044b\u0442\u0438\u0435\u043c \u0437\u0430\u0449\u0438\u0449\u0430\u0435\u043c\u043e\u0439 \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u0438. \u042d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u044f \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u043c\u043e\u0436\u0435\u0442 \u043f\u043e\u0437\u0432\u043e\u043b\u0438\u0442\u044c \u043d\u0430\u0440\u0443\u0448\u0438\u0442\u0435\u043b\u044e \u043e\u0431\u043e\u0439\u0442\u0438 \u043a\u0440\u0438\u043f\u0442\u043e\u0433\u0440\u0430\u0444\u0438\u0447\u0435\u0441\u043a\u0438\u0435 \u043c\u0435\u0445\u0430\u043d\u0438\u0437\u043c\u044b \u0437\u0430\u0449\u0438\u0442\u044b \u0448\u0438\u0444\u0440\u043e\u0432\u0430\u043d\u0438\u044f",
  "\u041f\u043e\u0441\u043b\u0435\u0434\u0441\u0442\u0432\u0438\u044f \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": null,
  "\u041f\u0440\u043e\u0447\u0430\u044f \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u044f": null,
  "\u0421\u0432\u044f\u0437\u044c \u0441 \u0438\u043d\u0446\u0438\u0434\u0435\u043d\u0442\u0430\u043c\u0438 \u0418\u0411": "\u0414\u0430\u043d\u043d\u044b\u0435 \u0443\u0442\u043e\u0447\u043d\u044f\u044e\u0442\u0441\u044f",
  "\u0421\u043e\u0441\u0442\u043e\u044f\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u041e\u043f\u0443\u0431\u043b\u0438\u043a\u043e\u0432\u0430\u043d\u0430",
  "\u0421\u043f\u043e\u0441\u043e\u0431 \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u044f": "\u041e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0435 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f",
  "\u0421\u043f\u043e\u0441\u043e\u0431 \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438": "\u041d\u0435\u0441\u0430\u043d\u043a\u0446\u0438\u043e\u043d\u0438\u0440\u043e\u0432\u0430\u043d\u043d\u044b\u0439 \u0441\u0431\u043e\u0440 \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u0438",
  "\u0421\u0441\u044b\u043b\u043a\u0438 \u043d\u0430 \u0438\u0441\u0442\u043e\u0447\u043d\u0438\u043a\u0438": "http://eprint.iacr.org/2016/594.pdf\nhttp://www.openwall.com/lists/oss-security/2016/06/09/8\nhttp://www.openwall.com/lists/oss-security/2016/06/08/2\nhttps://git.openssl.org/?p=openssl.git;a=commit;h=399944622df7bd81af62e67ea967c470534090e2\nhttps://bugzilla.redhat.com/show_bug.cgi?id=1343400\nhttp://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html\nhttp://lists.opensuse.org/opensuse-security-announce/2016-10/msg00013.html\nhttps://nodejs.org/en/blog/vulnerability/september-2016-security-releases/\nhttps://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05302448\nhttp://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html\nhttp://www.oracle.com/technetwork/topics/security/ovmbulletinoct2016-3090547.html\nhttp://www.oracle.com/technetwork/topics/security/linuxbulletinoct2016-3090545.html\nhttp://www.securityfocus.com/bid/91081\nhttp://www.securitytracker.com/id/1036054\nhttp://www.splunk.com/view/SP-CAAAPUE\nhttp://www.splunk.com/view/SP-CAAAPSV\nhttps://security.gentoo.org/glsa/201612-16\nhttps://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA40312\nhttps://bto.bluecoat.com/security-advisory/sa132\nhttp://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10759\nhttps://www.tenable.com/security/tns-2016-16\nhttp://www-01.ibm.com/support/docview.wss?uid=swg21995039\nhttp://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html\nhttp://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html\nhttps://www.tenable.com/security/tns-2016-21\nhttps://www.tenable.com/security/tns-2016-20\nhttps://security.FreeBSD.org/advisories/FreeBSD-SA-16:26.openssl.asc\nhttps://access.redhat.com/errata/RHSA-2017:1658\nhttps://access.redhat.com/errata/RHSA-2017:0194\nhttps://access.redhat.com/errata/RHSA-2017:0193\nhttp://rhn.redhat.com/errata/RHSA-2017-1659.html\nhttp://rhn.redhat.com/errata/RHSA-2016-2957.html\nhttp://rhn.redhat.com/errata/RHSA-2016-1940.html\nhttp://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html\nhttp://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html\nhttps://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbhf03856en_us\nhttps://kc.mcafee.com/corporate/index?page=content\u0026id=SB10215\nhttp://lists.opensuse.org/opensuse-security-announce/2016-10/msg00005.html\nhttp://www.debian.org/security/2016/dsa-3673\nhttp://lists.opensuse.org/opensuse-security-announce/2016-09/msg00024.html\nhttps://support.f5.com/csp/article/K53084033\nhttps://support.hpe.com/hpsc/doc/public/display?docLocale=en\u0026docId=emr_na-hpesbhf03856en_us\nhttp://www.openwall.com/lists/oss-security/2016/06/08/12\nhttp://www.openwall.com/lists/oss-security/2016/06/08/11\nhttp://lists.opensuse.org/opensuse-security-announce/2017-10/msg00010.html\nhttp://www.openwall.com/lists/oss-security/2016/06/08/10\nhttp://lists.opensuse.org/opensuse-security-announce/2016-10/msg00029.html\nhttp://www.openwall.com/lists/oss-security/2016/06/08/6\nhttp://www.openwall.com/lists/oss-security/2016/06/08/5\nhttp://www.openwall.com/lists/oss-security/2016/06/08/4\nhttps://www.arista.com/en/support/advisories-notices/security-advisories/1749-security-advisory-24\nhttp://lists.opensuse.org/opensuse-security-announce/2016-10/msg00012.html\nhttp://www.openwall.com/lists/oss-security/2016/06/08/8\nhttp://www.openwall.com/lists/oss-security/2016/06/08/7\nhttp://lists.opensuse.org/opensuse-security-announce/2018-02/msg00032.html\nhttp://www.ubuntu.com/usn/USN-3087-2\nhttp://lists.opensuse.org/opensuse-security-announce/2016-09/msg00023.html\nhttp://lists.opensuse.org/opensuse-security-announce/2016-10/msg00011.html\nhttp://www.huawei.com/en/psirt/security-advisories/huawei-sa-20170322-01-openssl-en\nhttp://www.ubuntu.com/usn/USN-3087-1\nhttp://lists.opensuse.org/opensuse-security-announce/2016-09/msg00031.html\nhttp://lists.opensuse.org/opensuse-security-announce/2017-10/msg00011.html\nhttp://seclists.org/fulldisclosure/2017/Jul/31\nhttp://lists.opensuse.org/opensuse-security-announce/2016-10/msg00021.html\nhttp://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160927-openssl\nhttps://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-c05302448\nhttp://lists.opensuse.org/opensuse-security-announce/2016-09/msg00022.html\nhttp://www.openwall.com/lists/oss-security/2016/06/09/2",
  "\u0421\u0442\u0430\u0442\u0443\u0441 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u041f\u043e\u0434\u0442\u0432\u0435\u0440\u0436\u0434\u0435\u043d\u0430 \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u0434\u0438\u0442\u0435\u043b\u0435\u043c",
  "\u0422\u0438\u043f \u041f\u041e": "\u041f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0435 \u0441\u0440\u0435\u0434\u0441\u0442\u0432\u043e \u0437\u0430\u0449\u0438\u0442\u044b, \u041e\u043f\u0435\u0440\u0430\u0446\u0438\u043e\u043d\u043d\u0430\u044f \u0441\u0438\u0441\u0442\u0435\u043c\u0430",
  "\u0422\u0438\u043f \u043e\u0448\u0438\u0431\u043a\u0438 CWE": "CWE-200",
  "\u0423\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0421\u0440\u0435\u0434\u043d\u0438\u0439 \u0443\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 (\u0431\u0430\u0437\u043e\u0432\u0430\u044f \u043e\u0446\u0435\u043d\u043a\u0430 CVSS 2.0 \u0441\u043e\u0441\u0442\u0430\u0432\u043b\u044f\u0435\u0442 4,6)\n\u0421\u0440\u0435\u0434\u043d\u0438\u0439 \u0443\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 (\u0431\u0430\u0437\u043e\u0432\u0430\u044f \u043e\u0446\u0435\u043d\u043a\u0430 CVSS 3.0 \u0441\u043e\u0441\u0442\u0430\u0432\u043b\u044f\u0435\u0442 5,5)"
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…