Vulnerability CVE-2016-2183: Information

Description

The DES and Triple DES ciphers, as used in the TLS, SSH, and IPSec protocols and other protocols and products, have a birthday bound of approximately four billion blocks, which makes it easier for remote attackers to obtain cleartext data via a birthday attack against a long-duration encrypted session, as demonstrated by an HTTPS session using Triple DES in CBC mode, aka a "Sweet32" attack.

Severity: HIGH (7.5) Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

Published: Sept. 1, 2016
Modified: Feb. 13, 2023
Error type identifier: CWE-200

Fixed packages

References to Advisories, Solutions, and Tools

Hyperlink
Resource
https://bugzilla.redhat.com/show_bug.cgi?id=1369383
  • Issue Tracking
  • Third Party Advisory
https://www.openssl.org/blog/blog/2016/08/24/sweet32/
  • Mitigation
  • Press/Media Coverage
  • Third Party Advisory
https://access.redhat.com/articles/2548661
  • Mitigation
  • Third Party Advisory
[tls] 20091120 RC4+3DES rekeying - long-lived TLS connections
  • Mailing List
  • Third Party Advisory
https://www.nccgroup.trust/us/about-us/newsroom-and-events/blog/2016/august/new-practical-attacks-on-64-bit-block-ciphers-3des-blowfish/
  • Press/Media Coverage
  • Technical Description
  • Third Party Advisory
https://github.com/ssllabs/ssllabs-scan/issues/387#issuecomment-242514633
  • Third Party Advisory
https://blog.cryptographyengineering.com/2016/08/24/attack-of-week-64-bit-ciphers-in-tls/
  • Press/Media Coverage
  • Technical Description
  • Third Party Advisory
https://www.sigsac.org/ccs/CCS2016/accepted-papers/
  • Third Party Advisory
https://www.teskalabs.com/blog/teskalabs-bulletin-160826-seacat-sweet32-issue
  • Third Party Advisory
https://access.redhat.com/security/cve/cve-2016-2183
  • Third Party Advisory
https://nakedsecurity.sophos.com/2016/08/25/anatomy-of-a-cryptographic-collision-the-sweet32-attack/
  • Press/Media Coverage
  • Technical Description
  • Third Party Advisory
https://sweet32.info/
  • Technical Description
  • Third Party Advisory
SUSE-SU-2016:2470
  • Third Party Advisory
https://nodejs.org/en/blog/vulnerability/september-2016-security-releases/
  • Third Party Advisory
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05302448
  • Third Party Advisory
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05309984
  • Third Party Advisory
http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html
  • Patch
  • Third Party Advisory
http://www.oracle.com/technetwork/topics/security/ovmbulletinoct2016-3090547.html
  • Third Party Advisory
http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2016-3090545.html
  • Third Party Advisory
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05323116
  • Third Party Advisory
92630
  • Third Party Advisory
  • VDB Entry
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05349499
  • Third Party Advisory
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05356388
  • Third Party Advisory
http://www.splunk.com/view/SP-CAAAPUE
  • Third Party Advisory
http://www.splunk.com/view/SP-CAAAPSV
  • Third Party Advisory
GLSA-201612-16
  • Third Party Advisory
https://kc.mcafee.com/corporate/index?page=content&id=SB10171
  • Third Party Advisory
https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA40312
  • Third Party Advisory
https://bto.bluecoat.com/security-advisory/sa133
  • Third Party Advisory
http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10759
  • Third Party Advisory
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05369403
  • Third Party Advisory
95568
  • Third Party Advisory
  • VDB Entry
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05369415
  • Third Party Advisory
https://www.tenable.com/security/tns-2016-16
  • Third Party Advisory
http://www-01.ibm.com/support/docview.wss?uid=swg21995039
  • Third Party Advisory
http://www-01.ibm.com/support/docview.wss?uid=swg21991482
  • Third Party Advisory
http://www-01.ibm.com/support/docview.wss?uid=nas8N1021697
  • Third Party Advisory
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05385680
  • Third Party Advisory
GLSA-201701-65
  • Third Party Advisory
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722
  • Third Party Advisory
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390849
  • Third Party Advisory
https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03725en_us
  • Third Party Advisory
GLSA-201707-01
  • Third Party Advisory
http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html
  • Patch
  • Third Party Advisory
https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbgn03765en_us
  • Third Party Advisory
1036696
  • Third Party Advisory
  • VDB Entry
http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
  • Patch
  • Third Party Advisory
https://www.tenable.com/security/tns-2017-09
  • Third Party Advisory
https://www.tenable.com/security/tns-2016-21
  • Third Party Advisory
https://www.tenable.com/security/tns-2016-20
  • Third Party Advisory
https://security.netapp.com/advisory/ntap-20170119-0001/
  • Third Party Advisory
https://security.netapp.com/advisory/ntap-20160915-0001/
  • Third Party Advisory
RHSA-2017:3240
  • Third Party Advisory
RHSA-2017:3239
  • Third Party Advisory
RHSA-2017:3114
  • Third Party Advisory
RHSA-2017:3113
  • Third Party Advisory
RHSA-2017:2710
  • Third Party Advisory
RHSA-2017:2709
  • Third Party Advisory
RHSA-2017:2708
  • Third Party Advisory
RHSA-2017:1216
  • Third Party Advisory
RHSA-2017:0462
  • Third Party Advisory
RHSA-2017:0338
  • Third Party Advisory
RHSA-2017:0337
  • Third Party Advisory
RHSA-2017:0336
  • Third Party Advisory
http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html
  • Patch
  • Third Party Advisory
https://ics-cert.us-cert.gov/advisories/ICSMA-18-058-02
  • Third Party Advisory
  • US Government Resource
http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html
  • Patch
  • Third Party Advisory
RHSA-2018:2123
  • Third Party Advisory
https://www.mitel.com/en-ca/support/security-advisories/mitel-product-security-advisory-17-0008
  • Third Party Advisory
RHSA-2019:1245
  • Third Party Advisory
https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html
  • Patch
  • Third Party Advisory
RHSA-2019:2859
  • Third Party Advisory
https://www.oracle.com/security-alerts/cpujan2020.html
  • Third Party Advisory
RHSA-2020:0451
  • Third Party Advisory
https://kc.mcafee.com/corporate/index?page=content&id=SB10310
  • Third Party Advisory
N/A
  • Third Party Advisory
https://www.oracle.com/security-alerts/cpujul2020.html
  • Third Party Advisory
https://www.oracle.com/security-alerts/cpuoct2020.html
  • Third Party Advisory
https://www.oracle.com/security-alerts/cpuoct2021.html
  • Third Party Advisory
USN-3270-1
  • Third Party Advisory
https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c05369415
  • Third Party Advisory
SUSE-SU-2017:0490
  • Mailing List
  • Third Party Advisory
20170329 [security bulletin] HPESBUX03725 rev.1 - HPE HP-UX Web Server Suite running Apache, Multiple Vulnerabilities
  • Third Party Advisory
  • VDB Entry
SUSE-SU-2017:0346
  • Mailing List
  • Third Party Advisory
20181113 [security bulletin] MFSBGN03831 rev. - Service Management Automation, remote disclosure of information
  • Mailing List
  • Third Party Advisory
SUSE-SU-2017:2699
  • Mailing List
  • Third Party Advisory
openSUSE-SU-2016:2537
  • Mailing List
  • Third Party Advisory
https://www.arista.com/en/support/advisories-notices/security-advisories/1749-security-advisory-24
  • Third Party Advisory
USN-3372-1
  • Third Party Advisory
SUSE-SU-2016:2469
  • Mailing List
  • Third Party Advisory
20170529 SSD Advisory - IBM Informix Dynamic Server and Informix Open Admin Tool Multiple Vulnerabilities
  • Mailing List
  • Third Party Advisory
https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c05385680
  • Third Party Advisory
https://softwaresupport.softwaregrp.com/document/-/facetsearch/document/KM03158613
  • Third Party Advisory
https://wiki.opendaylight.org/view/Security_Advisories
  • Third Party Advisory
USN-3087-2
  • Third Party Advisory
20180510 [security bulletin] MFSBGN03805 - HP Service Manager, Remote Disclosure of Information
  • Third Party Advisory
  • VDB Entry
openSUSE-SU-2017:0374
  • Mailing List
  • Third Party Advisory
SUSE-SU-2016:2468
  • Mailing List
  • Third Party Advisory
USN-3087-1
  • Third Party Advisory
openSUSE-SU-2016:2407
  • Mailing List
  • Third Party Advisory
USN-3194-1
  • Third Party Advisory
USN-3179-1
  • Third Party Advisory
USN-3198-1
  • Third Party Advisory
20170717 Orion Elite Hidden IP Browser Pro - All Versions - Multiple Known Vulnerabilities
  • Mailing List
  • Third Party Advisory
openSUSE-SU-2016:2496
  • Mailing List
  • Third Party Advisory
https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c05369403
  • Third Party Advisory
openSUSE-SU-2017:0513
  • Mailing List
  • Third Party Advisory
SUSE-SU-2016:2387
  • Mailing List
  • Third Party Advisory
20170831 [security bulletin] HPESBGN03765 rev.2 - HPE LoadRunner and HPE Performance Center, Remote Disclosure of Information
  • Third Party Advisory
  • VDB Entry
20161207 [security bulletin] HPSBHF03674 rev.1 HPE Comware 5 and Comware 7 Network Products using SSL/TLS, Remote Disclosure of Information
  • Third Party Advisory
  • VDB Entry
SUSE-SU-2017:0460
  • Mailing List
  • Third Party Advisory
https://kc.mcafee.com/corporate/index?page=content&id=SB10215
  • Third Party Advisory
20161207 [security bulletin] HPSBHF03674 rev.1 HPE Comware 5 and Comware 7 Network Products using SSL/TLS, Remote Disclosure of Information
  • Third Party Advisory
  • VDB Entry
SUSE-SU-2016:2458
  • Mailing List
  • Third Party Advisory
20180510 [security bulletin] MFSBGN03805 - HP Service Manager, Remote Disclosure of Information
  • Third Party Advisory
  • VDB Entry
https://support.f5.com/csp/article/K13167034
  • Third Party Advisory
42091
  • Third Party Advisory
  • VDB Entry
20170214 [security bulletin] HPESBGN03697 rev.1 - HPE Business Service Management (BSM), Remote Disclosure of Information
  • Third Party Advisory
  • VDB Entry
https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c05390849
  • Third Party Advisory
DSA-3673
  • Third Party Advisory
SUSE-SU-2016:2394
  • Mailing List
  • Third Party Advisory
20170831 [security bulletin] HPESBGN03765 rev.2 - HPE LoadRunner and HPE Performance Center, Remote Disclosure of Information
  • Third Party Advisory
  • VDB Entry
https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c05390722
  • Third Party Advisory
https://kc.mcafee.com/corporate/index?page=content&id=SB10186
  • Third Party Advisory
http://packetstormsecurity.com/files/142756/IBM-Informix-Dynamic-Server-DLL-Injection-Code-Execution.html
  • Third Party Advisory
  • VDB Entry
openSUSE-SU-2018:0458
  • Mailing List
  • Third Party Advisory
https://softwaresupport.softwaregrp.com/document/-/facetsearch/document/KM03286178
  • Third Party Advisory
openSUSE-SU-2016:2391
  • Mailing List
  • Third Party Advisory
http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20170322-01-openssl-en
  • Third Party Advisory
https://kc.mcafee.com/corporate/index?page=content&id=SB10197
  • Third Party Advisory
SUSE-SU-2017:1444
  • Mailing List
  • Third Party Advisory
SUSE-SU-2017:2700
  • Mailing List
  • Third Party Advisory
https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c05302448
  • Third Party Advisory
20170329 [security bulletin] HPESBUX03725 rev.1 - HPE HP-UX Web Server Suite running Apache, Multiple Vulnerabilities
  • Third Party Advisory
  • VDB Entry
https://cert-portal.siemens.com/productcert/pdf/ssa-412672.pdf
      1. Configuration 1

        cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*

        cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*

        cpe:2.3:a:redhat:jboss_enterprise_application_platform:6.0.0:*:*:*:*:*:*:*

        cpe:2.3:a:redhat:jboss_enterprise_web_server:2.0.0:*:*:*:*:*:*:*

        cpe:2.3:o:redhat:enterprise_linux:5.0:*:*:*:*:*:*:*

        cpe:2.3:a:redhat:jboss_enterprise_web_server:1.0.0:*:*:*:*:*:*:*

        cpe:2.3:a:redhat:jboss_web_server:3.0:*:*:*:*:*:*:*

        Configuration 2

        cpe:2.3:a:python:python:*:*:*:*:*:*:*:*
        Start including
        3.4.0
        End excliding
        3.4.7

        cpe:2.3:a:python:python:*:*:*:*:*:*:*:*
        Start including
        3.5.0
        End excliding
        3.5.3

        cpe:2.3:a:python:python:*:*:*:*:*:*:*:*
        Start including
        2.7.0
        End excliding
        2.7.13

        Configuration 3

        cpe:2.3:a:cisco:content_security_management_appliance:9.7.0-006:*:*:*:*:*:*:*

        cpe:2.3:a:cisco:content_security_management_appliance:9.6.6-068:*:*:*:*:*:*:*

        Configuration 4

        cpe:2.3:a:openssl:openssl:1.0.1m:*:*:*:*:*:*:*

        cpe:2.3:a:openssl:openssl:1.0.2a:*:*:*:*:*:*:*

        cpe:2.3:a:openssl:openssl:1.0.1j:*:*:*:*:*:*:*

        cpe:2.3:a:openssl:openssl:1.0.1h:*:*:*:*:*:*:*

        cpe:2.3:a:openssl:openssl:1.0.2e:*:*:*:*:*:*:*

        cpe:2.3:a:openssl:openssl:1.0.1r:*:*:*:*:*:*:*

        cpe:2.3:a:openssl:openssl:1.0.2b:*:*:*:*:*:*:*

        cpe:2.3:a:openssl:openssl:1.0.1c:*:*:*:*:*:*:*

        cpe:2.3:a:openssl:openssl:1.0.1g:*:*:*:*:*:*:*

        cpe:2.3:a:openssl:openssl:1.0.1a:*:*:*:*:*:*:*

        cpe:2.3:a:openssl:openssl:1.0.2h:*:*:*:*:*:*:*

        cpe:2.3:a:openssl:openssl:1.0.1d:*:*:*:*:*:*:*

        cpe:2.3:a:openssl:openssl:1.0.1t:*:*:*:*:*:*:*

        cpe:2.3:a:openssl:openssl:1.0.2c:*:*:*:*:*:*:*

        cpe:2.3:a:openssl:openssl:1.0.1p:*:*:*:*:*:*:*

        cpe:2.3:a:openssl:openssl:1.0.1k:*:*:*:*:*:*:*

        cpe:2.3:a:openssl:openssl:1.0.1b:*:*:*:*:*:*:*

        cpe:2.3:a:openssl:openssl:1.0.1n:*:*:*:*:*:*:*

        cpe:2.3:a:openssl:openssl:1.0.1q:*:*:*:*:*:*:*

        cpe:2.3:a:openssl:openssl:1.0.1e:*:*:*:*:*:*:*

        cpe:2.3:a:openssl:openssl:1.0.1l:*:*:*:*:*:*:*

        cpe:2.3:a:openssl:openssl:1.0.1f:*:*:*:*:*:*:*

        cpe:2.3:a:openssl:openssl:1.0.1o:*:*:*:*:*:*:*

        cpe:2.3:a:openssl:openssl:1.0.2f:*:*:*:*:*:*:*

        cpe:2.3:a:openssl:openssl:1.0.1i:*:*:*:*:*:*:*

        cpe:2.3:a:openssl:openssl:1.0.2d:*:*:*:*:*:*:*

        Configuration 5

        cpe:2.3:a:oracle:database:12.1.0.2:*:*:*:*:*:*:*

        cpe:2.3:a:oracle:database:11.2.0.4:*:*:*:*:*:*:*

        Configuration 6

        cpe:2.3:a:nodejs:node.js:*:*:*:*:-:*:*:*
        Start including
        6.0.0
        End excliding
        6.7.0

        cpe:2.3:a:nodejs:node.js:*:*:*:*:-:*:*:*
        Start including
        4.0.0
        End excliding
        4.1.2

        cpe:2.3:a:nodejs:node.js:*:*:*:*:lts:*:*:*
        Start including
        4.2.0
        End excliding
        4.6.0

        cpe:2.3:a:nodejs:node.js:*:*:*:*:*:*:*:*
        Start including
        0.12.0
        End excliding
        0.12.16

        cpe:2.3:a:nodejs:node.js:*:*:*:*:*:*:*:*
        Start including
        0.10.0
        End excliding
        0.10.47