Vulnerability CVE-2016-2105: Information

Description

Integer overflow in the EVP_EncodeUpdate function in crypto/evp/encode.c in OpenSSL before 1.0.1t and 1.0.2 before 1.0.2h allows remote attackers to cause a denial of service (heap memory corruption) via a large amount of binary data.

Severity: HIGH (7.5) Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

Published: May 5, 2016
Modified: Nov. 7, 2023
Error type identifier: CWE-190

Fixed packages

Package name
Branch
Fixed in version
Version from repository
Errata ID
Task #
State
LibreSSLsisyphus2.3.4-alt13.7.3-alt1ALT-PU-2016-1439-1164217Fixed
LibreSSLp102.3.4-alt13.7.3-alt1ALT-PU-2016-1439-1164217Fixed
LibreSSLp92.3.4-alt12.9.1-alt2ALT-PU-2016-1439-1164217Fixed
LibreSSLp82.3.4-alt12.5.5-alt2.M80P.1ALT-PU-2016-1441-1164218Fixed
LibreSSLc10f12.3.4-alt13.7.3-alt1ALT-PU-2016-1439-1164217Fixed
LibreSSLc9f22.3.4-alt12.9.1-alt2ALT-PU-2016-1439-1164217Fixed
nodesisyphus4.4.5-alt120.12.1-alt1ALT-PU-2016-1623-1166080Fixed
nodep104.4.5-alt116.19.1-alt1ALT-PU-2016-1623-1166080Fixed
nodep94.4.5-alt114.17.2-alt1ALT-PU-2016-1623-1166080Fixed
nodep84.4.7-alt18.11.4-alt0.M80P.1ALT-PU-2016-1757-1167017Fixed
nodec10f14.4.5-alt116.19.1-alt1ALT-PU-2016-1623-1166080Fixed
nodec9f24.4.5-alt116.19.1-alt0.c9.1ALT-PU-2016-1623-1166080Fixed
openssl10p91.0.2h-alt11.0.2u-alt1.p9.2ALT-PU-2016-1438-1164214Fixed
openssl10p81.0.2h-alt11.0.2u-alt0.M80P.2ALT-PU-2016-1440-1164216Fixed
openssl10c9f21.0.2h-alt11.0.2u-alt1.p9.1ALT-PU-2016-1438-1164214Fixed
openssl10c71.0.1t-alt0.M70C.11.0.1u-alt0.M70C.1ALT-PU-2016-1445-1164273Fixed

References to Advisories, Solutions, and Tools

Hyperlink
Resource
https://www.openssl.org/news/secadv/20160503.txt
  • Vendor Advisory
https://kc.mcafee.com/corporate/index?page=content&id=SB10160
  • Third Party Advisory
openSUSE-SU-2016:1566
  • Third Party Advisory
RHSA-2016:0722
  • Third Party Advisory
RHSA-2016:0996
  • Third Party Advisory
http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html
  • Patch
  • Third Party Advisory
APPLE-SA-2016-07-18-1
  • Mailing List
  • Third Party Advisory
https://support.apple.com/HT206903
  • Third Party Advisory
91787
  • Third Party Advisory
  • VDB Entry
http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html
  • Vendor Advisory
http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html
  • Vendor Advisory
RHSA-2016:1650
  • Third Party Advisory
RHSA-2016:1648
  • Third Party Advisory
RHSA-2016:1649
  • Third Party Advisory
http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html
  • Vendor Advisory
http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
  • Vendor Advisory
http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html
  • Patch
  • Vendor Advisory
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05320149
  • Vendor Advisory
89757
  • Third Party Advisory
  • VDB Entry
openSUSE-SU-2016:1240
  • Mailing List
  • Third Party Advisory
openSUSE-SU-2016:1238
  • Mailing List
  • Third Party Advisory
FEDORA-2016-1e39d934ed
  • Mailing List
  • Third Party Advisory
openSUSE-SU-2016:1242
  • Mailing List
  • Third Party Advisory
FreeBSD-SA-16:17
  • Third Party Advisory
SUSE-SU-2016:1231
  • Mailing List
  • Third Party Advisory
FEDORA-2016-05c567df1a
  • Mailing List
  • Third Party Advisory
USN-2959-1
  • Third Party Advisory
SUSE-SU-2016:1290
  • Mailing List
  • Third Party Advisory
openSUSE-SU-2016:1239
  • Mailing List
  • Third Party Advisory
openSUSE-SU-2016:1241
  • Mailing List
  • Third Party Advisory
SUSE-SU-2016:1206
  • Mailing List
  • Third Party Advisory
openSUSE-SU-2016:1237
  • Mailing List
  • Third Party Advisory
SSA:2016-124-01
  • Third Party Advisory
openSUSE-SU-2016:1243
  • Mailing List
  • Third Party Advisory
SUSE-SU-2016:1360
  • Mailing List
  • Third Party Advisory
1035721
  • Third Party Advisory
  • VDB Entry
DSA-3566
  • Third Party Advisory
openSUSE-SU-2016:1273
  • Mailing List
  • Third Party Advisory
20160504 Multiple Vulnerabilities in OpenSSL Affecting Cisco Products: May 2016
  • Third Party Advisory
SUSE-SU-2016:1233
  • Mailing List
  • Third Party Advisory
SUSE-SU-2016:1228
  • Mailing List
  • Third Party Advisory
FEDORA-2016-1411324654
  • Mailing List
  • Third Party Advisory
SUSE-SU-2016:1267
  • Mailing List
  • Third Party Advisory
https://bto.bluecoat.com/security-advisory/sa123
  • Third Party Advisory
http://packetstormsecurity.com/files/136912/Slackware-Security-Advisory-openssl-Updates.html
  • Third Party Advisory
  • VDB Entry
GLSA-201612-16
  • Third Party Advisory
http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10759
  • Third Party Advisory
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722
  • Third Party Advisory
https://www.tenable.com/security/tns-2016-18
  • Third Party Advisory
https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03756en_us
  • Third Party Advisory
https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03765en_us
  • Third Party Advisory
http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html
  • Patch
  • Vendor Advisory
https://security.netapp.com/advisory/ntap-20160504-0001/
  • Third Party Advisory
https://source.android.com/security/bulletin/pixel/2017-11-01
  • Third Party Advisory
RHSA-2016:2957
  • Third Party Advisory
RHSA-2016:2073
  • Third Party Advisory
RHSA-2016:2056
  • Third Party Advisory
http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html
  • Patch
  • Vendor Advisory
http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html
  • Patch
  • Vendor Advisory
https://cert-portal.siemens.com/productcert/pdf/ssa-412672.pdf
    https://git.openssl.org/?p=openssl.git%3Ba=commit%3Bh=5b814481f3573fa9677f3a31ee51322e2a22ee6a
        1. Configuration 1

          cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*

          cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*

          cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*

          cpe:2.3:o:redhat:enterprise_linux_hpc_node:6:*:*:*:*:*:*:*

          Configuration 2

          cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*

          cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*

          Configuration 3

          cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
          Start including
          5.6.0
          End including
          5.6.30

          cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
          Start including
          5.7.0
          End including
          5.7.12

          Configuration 4

          cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*

          cpe:2.3:o:redhat:enterprise_linux_server_aus:7.2:*:*:*:*:*:*:*

          cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*

          cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*

          cpe:2.3:o:redhat:enterprise_linux_hpc_node:7.0:*:*:*:*:*:*:*

          cpe:2.3:o:redhat:enterprise_linux_server_eus:7.2:*:*:*:*:*:*:*

          cpe:2.3:o:redhat:enterprise_linux_hpc_node_eus:7.2:*:*:*:*:*:*:*

          Configuration 5

          cpe:2.3:o:apple:mac_os_x:10.11.5:*:*:*:*:*:*:*

          Configuration 6

          cpe:2.3:a:openssl:openssl:1.0.1m:*:*:*:*:*:*:*

          cpe:2.3:a:openssl:openssl:1.0.2a:*:*:*:*:*:*:*

          cpe:2.3:a:openssl:openssl:1.0.1j:*:*:*:*:*:*:*

          cpe:2.3:a:openssl:openssl:1.0.1:beta2:*:*:*:*:*:*

          cpe:2.3:a:openssl:openssl:1.0.1h:*:*:*:*:*:*:*

          cpe:2.3:a:openssl:openssl:1.0.2e:*:*:*:*:*:*:*

          cpe:2.3:a:openssl:openssl:1.0.1r:*:*:*:*:*:*:*

          cpe:2.3:a:openssl:openssl:1.0.2b:*:*:*:*:*:*:*

          cpe:2.3:a:openssl:openssl:1.0.1c:*:*:*:*:*:*:*

          cpe:2.3:a:openssl:openssl:1.0.1g:*:*:*:*:*:*:*

          cpe:2.3:a:openssl:openssl:1.0.2g:*:*:*:*:*:*:*

          cpe:2.3:a:openssl:openssl:1.0.1:beta3:*:*:*:*:*:*

          cpe:2.3:a:openssl:openssl:1.0.1a:*:*:*:*:*:*:*

          cpe:2.3:a:openssl:openssl:1.0.1:beta1:*:*:*:*:*:*

          cpe:2.3:a:openssl:openssl:1.0.1d:*:*:*:*:*:*:*

          cpe:2.3:a:openssl:openssl:1.0.2c:*:*:*:*:*:*:*

          cpe:2.3:a:openssl:openssl:1.0.2:beta3:*:*:*:*:*:*

          cpe:2.3:a:openssl:openssl:1.0.1p:*:*:*:*:*:*:*

          cpe:2.3:a:openssl:openssl:1.0.2:beta1:*:*:*:*:*:*

          cpe:2.3:a:openssl:openssl:1.0.1k:*:*:*:*:*:*:*

          cpe:2.3:a:openssl:openssl:1.0.1b:*:*:*:*:*:*:*

          cpe:2.3:a:openssl:openssl:1.0.1n:*:*:*:*:*:*:*

          cpe:2.3:a:openssl:openssl:1.0.1q:*:*:*:*:*:*:*

          cpe:2.3:a:openssl:openssl:1.0.1e:*:*:*:*:*:*:*

          cpe:2.3:a:openssl:openssl:1.0.1l:*:*:*:*:*:*:*

          cpe:2.3:a:openssl:openssl:1.0.1f:*:*:*:*:*:*:*

          cpe:2.3:a:openssl:openssl:1.0.1s:*:*:*:*:*:*:*

          cpe:2.3:a:openssl:openssl:1.0.1o:*:*:*:*:*:*:*

          cpe:2.3:a:openssl:openssl:1.0.2:*:*:*:*:*:*:*

          cpe:2.3:a:openssl:openssl:1.0.2f:*:*:*:*:*:*:*

          cpe:2.3:a:openssl:openssl:1.0.1i:*:*:*:*:*:*:*

          cpe:2.3:a:openssl:openssl:1.0.2:beta2:*:*:*:*:*:*

          cpe:2.3:a:openssl:openssl:1.0.1:*:*:*:*:*:*:*

          cpe:2.3:a:openssl:openssl:1.0.2d:*:*:*:*:*:*:*

          Configuration 7

          cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*

          Configuration 8

          cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*

          cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*

          cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*

          cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*

          Configuration 9

          cpe:2.3:a:nodejs:node.js:*:*:*:*:-:*:*:*
          Start including
          4.0.0
          End including
          4.1.2

          cpe:2.3:a:nodejs:node.js:6.0.0:*:*:*:-:*:*:*

          cpe:2.3:a:nodejs:node.js:*:*:*:*:*:*:*:*
          Start including
          5.0.0
          End excliding
          5.11.1

          cpe:2.3:a:nodejs:node.js:*:*:*:*:*:*:*:*
          Start including
          0.12.0
          End excliding
          0.12.14

          cpe:2.3:a:nodejs:node.js:*:*:*:*:*:*:*:*
          Start including
          0.10.0
          End excliding
          0.10.45

          cpe:2.3:a:nodejs:node.js:*:*:*:*:lts:*:*:*
          Start including
          4.2.0
          End excliding
          4.4.4