Уязвимость CVE-2016-0705: Информация

Описание

Double free vulnerability in the dsa_priv_decode function in crypto/dsa/dsa_ameth.c in OpenSSL 1.0.1 before 1.0.1s and 1.0.2 before 1.0.2g allows remote attackers to cause a denial of service (memory corruption) or possibly have unspecified other impact via a malformed DSA private key.

Важность: CRITICAL (9,8) Вектор: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Опубликовано: 3 марта 2016 г.
Изменено: 7 ноября 2023 г.

Исправленные пакеты

Имя пакета
Ветка
Исправлено в версии
Версия в репозитории
Errata ID
№ Задания
Состояние
openssl10p91.0.2g-alt11.0.2u-alt1.p9.2ALT-PU-2016-1184-1160361Исправлено
openssl10c9f21.0.2g-alt11.0.2u-alt1.p9.1ALT-PU-2016-1184-1160361Исправлено
openssl10c71.0.1s-alt0.M70C.11.0.1u-alt0.M70C.1ALT-PU-2016-1391-1163807Исправлено

Ссылки на рекомендации, решения и инструменты

Ссылка
Ресурс
http://openssl.org/news/secadv/20160301.txt
  • Vendor Advisory
https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA40168
  • Third Party Advisory
http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html
  • Patch
  • Vendor Advisory
http://source.android.com/security/bulletin/2016-05-01.html
  • Third Party Advisory
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05068681
  • Third Party Advisory
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05111017
  • Third Party Advisory
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05131085
  • Third Party Advisory
openSUSE-SU-2016:1566
  • Mailing List
  • Third Party Advisory
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05150800
  • Third Party Advisory
http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html
  • Patch
  • Vendor Advisory
91787
  • Third Party Advisory
  • VDB Entry
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05150888
  • Third Party Advisory
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05086877
  • Third Party Advisory
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05141441
  • Third Party Advisory
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05150736
  • Third Party Advisory
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05135617
  • Third Party Advisory
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05158380
  • Third Party Advisory
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05176716
  • Third Party Advisory
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05126404
  • Third Party Advisory
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05052990
  • Third Party Advisory
HPSBMU03575
  • Mailing List
  • Third Party Advisory
HPSBGN03569
  • Mailing List
  • Third Party Advisory
HPSBGN03563
  • Mailing List
  • Third Party Advisory
http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
  • Vendor Advisory
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05301946
  • Third Party Advisory
http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html
  • Vendor Advisory
83754
  • Third Party Advisory
  • VDB Entry
openSUSE-SU-2016:1332
  • Mailing List
  • Third Party Advisory
https://www.openssl.org/news/secadv/20160301.txt
  • Vendor Advisory
SUSE-SU-2016:0621
  • Mailing List
  • Third Party Advisory
openSUSE-SU-2016:0638
  • Mailing List
  • Third Party Advisory
openSUSE-SU-2016:0627
  • Mailing List
  • Third Party Advisory
SUSE-SU-2016:0631
  • Mailing List
  • Third Party Advisory
20160302 Multiple Vulnerabilities in OpenSSL Affecting Cisco Products: March 2016
  • Third Party Advisory
openSUSE-SU-2016:0637
  • Mailing List
  • Third Party Advisory
SUSE-SU-2016:0617
  • Mailing List
  • Third Party Advisory
DSA-3500
  • Third Party Advisory
GLSA-201603-15
  • Third Party Advisory
SUSE-SU-2016:0624
  • Mailing List
  • Third Party Advisory
SUSE-SU-2016:0620
  • Mailing List
  • Third Party Advisory
openSUSE-SU-2016:0628
  • Mailing List
  • Third Party Advisory
FEDORA-2016-2802690366
  • Mailing List
  • Third Party Advisory
SUSE-SU-2016:1057
  • Mailing List
  • Third Party Advisory
USN-2914-1
  • Third Party Advisory
FEDORA-2016-e6807b3394
  • Mailing List
  • Third Party Advisory
http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10759
  • Third Party Advisory
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05376917
  • Third Party Advisory
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722
  • Third Party Advisory
https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03741en_us
  • Third Party Advisory
1035133
  • Third Party Advisory
  • VDB Entry
FreeBSD-SA-16:12
  • Vendor Advisory
RHSA-2016:2957
  • Third Party Advisory
RHSA-2018:2568
  • Third Party Advisory
RHSA-2018:2575
  • Third Party Advisory
RHSA-2018:2713
  • Third Party Advisory
https://cert-portal.siemens.com/productcert/pdf/ssa-412672.pdf
    https://git.openssl.org/?p=openssl.git%3Ba=commit%3Bh=6c88c71b4e4825c7bc0489306d062d017634eb88
        1. Конфигурация 1

          cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
          Start including
          5.6.0
          End including
          5.6.29

          cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
          Start including
          5.7.0
          End including
          5.7.11

          Конфигурация 2

          cpe:2.3:a:openssl:openssl:1.0.1m:*:*:*:*:*:*:*

          cpe:2.3:a:openssl:openssl:1.0.2a:*:*:*:*:*:*:*

          cpe:2.3:a:openssl:openssl:1.0.1j:*:*:*:*:*:*:*

          cpe:2.3:a:openssl:openssl:1.0.1:beta2:*:*:*:*:*:*

          cpe:2.3:a:openssl:openssl:1.0.1h:*:*:*:*:*:*:*

          cpe:2.3:a:openssl:openssl:1.0.2e:*:*:*:*:*:*:*

          cpe:2.3:a:openssl:openssl:1.0.1r:*:*:*:*:*:*:*

          cpe:2.3:a:openssl:openssl:1.0.2b:*:*:*:*:*:*:*

          cpe:2.3:a:openssl:openssl:1.0.1c:*:*:*:*:*:*:*

          cpe:2.3:a:openssl:openssl:1.0.1g:*:*:*:*:*:*:*

          cpe:2.3:a:openssl:openssl:1.0.1:beta3:*:*:*:*:*:*

          cpe:2.3:a:openssl:openssl:1.0.1a:*:*:*:*:*:*:*

          cpe:2.3:a:openssl:openssl:1.0.1:beta1:*:*:*:*:*:*

          cpe:2.3:a:openssl:openssl:1.0.1d:*:*:*:*:*:*:*

          cpe:2.3:a:openssl:openssl:1.0.2c:*:*:*:*:*:*:*

          cpe:2.3:a:openssl:openssl:1.0.2:beta3:*:*:*:*:*:*

          cpe:2.3:a:openssl:openssl:1.0.1p:*:*:*:*:*:*:*

          cpe:2.3:a:openssl:openssl:1.0.2:beta1:*:*:*:*:*:*

          cpe:2.3:a:openssl:openssl:1.0.1k:*:*:*:*:*:*:*

          cpe:2.3:a:openssl:openssl:1.0.1b:*:*:*:*:*:*:*

          cpe:2.3:a:openssl:openssl:1.0.1n:*:*:*:*:*:*:*

          cpe:2.3:a:openssl:openssl:1.0.1q:*:*:*:*:*:*:*

          cpe:2.3:a:openssl:openssl:1.0.1e:*:*:*:*:*:*:*

          cpe:2.3:a:openssl:openssl:1.0.1l:*:*:*:*:*:*:*

          cpe:2.3:a:openssl:openssl:1.0.1f:*:*:*:*:*:*:*

          cpe:2.3:a:openssl:openssl:1.0.1o:*:*:*:*:*:*:*

          cpe:2.3:a:openssl:openssl:1.0.2:*:*:*:*:*:*:*

          cpe:2.3:a:openssl:openssl:1.0.2f:*:*:*:*:*:*:*

          cpe:2.3:a:openssl:openssl:1.0.1i:*:*:*:*:*:*:*

          cpe:2.3:a:openssl:openssl:1.0.2:beta2:*:*:*:*:*:*

          cpe:2.3:a:openssl:openssl:1.0.1:*:*:*:*:*:*:*

          cpe:2.3:a:openssl:openssl:1.0.2d:*:*:*:*:*:*:*

          Конфигурация 3

          cpe:2.3:o:google:android:5.1.0:*:*:*:*:*:*:*

          cpe:2.3:o:google:android:4.2:*:*:*:*:*:*:*

          cpe:2.3:o:google:android:4.1:*:*:*:*:*:*:*

          cpe:2.3:o:google:android:6.0.1:*:*:*:*:*:*:*

          cpe:2.3:o:google:android:6.0:*:*:*:*:*:*:*

          cpe:2.3:o:google:android:4.0.2:*:*:*:*:*:*:*

          cpe:2.3:o:google:android:4.4.3:*:*:*:*:*:*:*

          cpe:2.3:o:google:android:4.0.4:*:*:*:*:*:*:*

          cpe:2.3:o:google:android:4.3:*:*:*:*:*:*:*

          cpe:2.3:o:google:android:4.0.1:*:*:*:*:*:*:*

          cpe:2.3:o:google:android:4.2.1:*:*:*:*:*:*:*

          cpe:2.3:o:google:android:5.0.1:*:*:*:*:*:*:*

          cpe:2.3:o:google:android:5.0:*:*:*:*:*:*:*

          cpe:2.3:o:google:android:4.0.3:*:*:*:*:*:*:*

          cpe:2.3:o:google:android:4.0:*:*:*:*:*:*:*

          cpe:2.3:o:google:android:4.4:*:*:*:*:*:*:*

          cpe:2.3:o:google:android:4.4.1:*:*:*:*:*:*:*

          cpe:2.3:o:google:android:4.2.2:*:*:*:*:*:*:*

          cpe:2.3:o:google:android:4.3.1:*:*:*:*:*:*:*

          cpe:2.3:o:google:android:4.4.2:*:*:*:*:*:*:*

          cpe:2.3:o:google:android:5.1:*:*:*:*:*:*:*

          cpe:2.3:o:google:android:4.1.2:*:*:*:*:*:*:*

          Конфигурация 4

          cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*

          cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*

          cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*

          Конфигурация 5

          cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*

          cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*