ID

VAR-201609-0597


CVE

CVE-2016-2183


TITLE

OpenSSL Information disclosure vulnerability

Trust: 0.6

sources: CNNVD: CNNVD-201608-448

DESCRIPTION

The DES and Triple DES ciphers, as used in the TLS, SSH, and IPSec protocols and other protocols and products, have a birthday bound of approximately four billion blocks, which makes it easier for remote attackers to obtain cleartext data via a birthday attack against a long-duration encrypted session, as demonstrated by an HTTPS session using Triple DES in CBC mode, aka a "Sweet32" attack. IPSec (full name Internet Protocol Security) is a set of IP security protocols established by the IPSec group of the Internet Engineering Task Force (IETF). Both DES and Triple DES are encryption algorithms. There are information leakage vulnerabilities in the DES and Triple DES encryption algorithms used in the TLS, SSH, and IPSec protocols and other protocols and products. This vulnerability stems from configuration errors in network systems or products during operation. (CVE-2016-2183) 3. Solution: For OpenShift Container Platform 4.1 see the following documentation, which will be updated shortly for release 4.1.18, for important instructions on how to upgrade your cluster and fully apply this asynchronous errata update: https://docs.openshift.com/container-platform/4.1/release_notes/ocp-4-1-rel ease-notes.html 4. Bugs fixed (https://bugzilla.redhat.com/): 1369383 - CVE-2016-2183 SSL/TLS: Birthday attack against 64-bit block ciphers (SWEET32) 5. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Important: Red Hat JBoss Enterprise Application Platform 6.4.18 security update Advisory ID: RHSA-2017:3239-01 Product: Red Hat JBoss Enterprise Application Platform Advisory URL: https://access.redhat.com/errata/RHSA-2017:3239 Issue date: 2017-11-16 CVE Names: CVE-2016-2183 CVE-2017-9788 CVE-2017-9798 ===================================================================== 1. Summary: An update is now available for Red Hat JBoss Enterprise Application Platform. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. 2. Description: Red Hat JBoss Enterprise Application Platform is a platform for Java applications based on the JBoss Application Server. This release provides an update to httpd and OpenSSL. The updates are documented in the Release Notes document linked to in the References. The httpd packages provide the Apache HTTP Server, a powerful, efficient, and extensible web server. OpenSSL is a toolkit that implements the Secure Sockets Layer (SSL) and Transport Layer Security (TLS) protocols, as well as a full-strength general-purpose cryptography library. This release of JBoss Enterprise Application Platform 6.4.18 Natives serves as a replacement of the JBoss Enterprise Application Platform 6.4.16 Natives and includes bug fixes which are documented in the Release Notes document linked to in the References. All users of Red Hat JBoss Enterprise Application Platform 6.4 Natives are advised to upgrade to these updated packages. Security Fix(es): * It was discovered that the httpd's mod_auth_digest module did not properly initialize memory before using it when processing certain headers related to digest authentication. A remote attacker could possibly use this flaw to disclose potentially sensitive information or cause httpd child process to crash by sending specially crafted requests to a server. (CVE-2017-9788) * A flaw was found in the way the DES/3DES cipher was used as part of the TLS/SSL protocol. A man-in-the-middle attacker could use this flaw to recover some plaintext data by capturing large amounts of encrypted traffic between TLS/SSL server and client if the communication used a DES/3DES based ciphersuite. (CVE-2016-2183) * A use-after-free flaw was found in the way httpd handled invalid and previously unregistered HTTP methods specified in the Limit directive used in an .htaccess file. A remote attacker could possibly use this flaw to disclose portions of the server memory, or cause httpd child process to crash. (CVE-2017-9798) Red Hat would like to thank OpenVPN for reporting CVE-2016-2183 and Hanno BAPck for reporting CVE-2017-9798. Upstream acknowledges Karthikeyan Bhargavan (Inria) and GaA<<tan Leurent (Inria) as the original reporters of CVE-2016-2183. Bug Fix(es): * CRL checking of very large CRLs fails with OpenSSL 1.0.2 (BZ#1508880) * mod_cluster segfaults in process_info() due to wrongly generated assembler instruction movslq (BZ#1508884) * Corruption in nodestatsmem in multiple core dumps but in different functions of each core dump. (BZ#1508885) 3. Solution: Before applying this update, back up your existing Red Hat JBoss Enterprise Application Platform installation and deployed applications. The References section of this erratum contains a download link (you must log in to download the update). The JBoss server process must be restarted for the update to take effect. 4. Bugs fixed (https://bugzilla.redhat.com/): 1369383 - CVE-2016-2183 SSL/TLS: Birthday attack against 64-bit block ciphers (SWEET32) 1470748 - CVE-2017-9788 httpd: Uninitialized memory reflection in mod_auth_digest 1490344 - CVE-2017-9798 httpd: Use-after-free by limiting unregistered HTTP method (Optionsbleed) 1508880 - Unable to load large CRL openssl problem 1508884 - mod_cluster segfaults in process_info() due to wrongly generated assembler instruction movslq 1508885 - SegFault due to corrupt nodestatsmem 5. References: https://access.redhat.com/security/cve/CVE-2016-2183 https://access.redhat.com/security/cve/CVE-2017-9788 https://access.redhat.com/security/cve/CVE-2017-9798 https://access.redhat.com/security/updates/classification/#important https://access.redhat.com/documentation/en/jboss-enterprise-application-platform/ https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?product=appplatform&downloadType=securityPatches&version=6.4 https://access.redhat.com/articles/3229231 6. Contact: The Red Hat security contact is <secalert@redhat.com>. More contact details at https://access.redhat.com/security/team/contact/ Copyright 2017 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iD8DBQFaDeKOXlSAg2UNWIIRAlR3AKC25a1x1f7rkZYa74mYGwCi74HFRwCgvcGM wGn3j+UrRlNt1rGOWBoVHZ8= =SKvr -----END PGP SIGNATURE----- -- RHSA-announce mailing list RHSA-announce@redhat.com https://www.redhat.com/mailman/listinfo/rhsa-announce . -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 Note: the current version of the following document is available here: https://softwaresupport.hpe.com/document/-/facetsearch/document/KM03158613 SUPPORT COMMUNICATION - SECURITY BULLETIN Document ID: KM03158613 Version: 1 MFSBGN03805 - HP Service Manager, Remote Disclosure of Information NOTICE: The information in this Security Bulletin should be acted upon as soon as possible. Release Date: 2018-05-10 Last Updated: 2018-05-10 Potential Security Impact: Remote: Disclosure of Information Source: Micro Focus, Product Security Response Team VULNERABILITY SUMMARY A potential security vulnerability has been identified in Service Manager. This vulnerability may allow an exploit against a long-duration encrypted session known as the Sweet32 attack, and which may be exploited remotely. References: - CVE-2016-2183 - CVE-2016-6329 SUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed. - HP Service Manager Software - v9.30, v9.31, v9.32, v9.33, v9.34, v9.35, v9.40, v9.41, v9.50, v9.51 BACKGROUND CVSS Base Metrics ================= Reference, CVSS V3 Score/Vector, CVSS V2 Score/Vector RESOLUTION MicroFocus has made the following information available to resolve the vulnerability for the impacted versions of Service Manager: For versions 9.30, 9.31, 9.32, 9.33, 9.34, 9.35 please upgrade to SM 9.35.P6: SM9.35 P6 packages, SM 9.35 AIX Server 9.35.6007 p6 <http://softwaresupport.softwaregrp.com/group/softwaresupport/search-result/- facetsearch/document/LID/HPSM_00916> SM 9.35 HP Itanium Server 9.35.6007 p6 <http://softwaresupport.softwaregrp.com/group/softwaresupport/search-result/- facetsearch/document/LID/HPSM_00917> SM 9.35 HP Itanium Server for Oracle 12c 9.35.6007 p6 <http://softwaresupport.softwaregrp.com/group/softwaresupport/search-result/- facetsearch/document/LID/HPSM_00918> SM 9.35 Linux Server 9.35.6007 p6 <http://softwaresupport.softwaregrp.com/group/softwaresupport/search-result/- facetsearch/document/LID/HPSM_00919> SM 9.35 Solaris Server 9.35.6007 p6 <http://softwaresupport.softwaregrp.com/group/softwaresupport/search-result/- facetsearch/document/LID/HPSM_00920> SM 9.35 Windows Server 9.35.6007 p6 <http://softwaresupport.softwaregrp.com/group/softwaresupport/search-result/- facetsearch/document/LID/HPSM_00921> For version 9.40, 9.41 please upgrade to SM 9.41.P6: SM9.41.P6 packages, Service Manager 9.41.6000 p6 - Server for AIX <http://softwaresupport.softwaregrp.com/group/softwaresupport/search-result/- facetsearch/document/LID/HPSM_00891> Service Manager 9.41.6000 p6 - Server for HP-UX/IA <http://softwaresupport.softwaregrp.com/group/softwaresupport/search-result/- facetsearch/document/LID/HPSM_00892> Service Manager 9.41.6000 p6 - Server for Linux <http://softwaresupport.softwaregrp.com/group/softwaresupport/search-result/- facetsearch/document/LID/HPSM_00893> Service Manager 9.41.6000 p6 - Server for Solaris <http://softwaresupport.softwaregrp.com/group/softwaresupport/search-result/- facetsearch/document/LID/HPSM_00894> Service Manager 9.41.6000 p6 - Server for Windows <http://softwaresupport.softwaregrp.com/group/softwaresupport/search-result/- facetsearch/document/LID/HPSM_00895> For version 9.50, 9.51 Server and KM components please upgrade to SM 9.52.P2: SM9.52.P2 packages, Service Manager 9.52.2021 p2 - Server for Windows <http://softwaresupport.softwaregrp.com/group/softwaresupport/search-result/- facetsearch/document/LID/HPSM_00906> Service Manager 9.52.2021 p2 - Server for Linux <http://softwaresupport.softwaregrp.com/group/softwaresupport/search-result/- facetsearch/document/LID/HPSM_00907> For version 9.50, 9.51 SMSP and SMC components please upgrade to SM 9.52: SM9.52 packages, Service Manager 9.52 as a minor.minor full (MMF) release (due to the new SP aggregation SKU for Propel customers) is released on the following sites instead of SSO. <https://h22255.www2.hpe.com/mysoftware/index> HISTORY Version:1 (rev.1) - 10 May 2018 Initial release Third Party Security Patches: Third party security patches that are to be installed on systems running Micro Focus products should be applied in accordance with the customer's patch management policy. Support: For issues about implementing the recommendations of this Security Bulletin, contact normal Micro Focus services support channel. For other issues about the content of this Security Bulletin, send e-mail to cyber-psrt@microfocus.com. Report: To report a potential security vulnerability for any supported product: Web form: https://www.microfocus.com/support-and-services/report-security Email: security@microfocus.com Subscribe: To initiate receiving subscriptions for future Micro Focus Security Bulletin alerts via Email, please subscribe here - https://softwaresupport.hpe.com/group/softwaresupport/email-notification/-/subscriptions/registerdocumentnotification Once you are logged in to the portal, please choose security bulletins under product and document types. Please note that you will need to sign in using a Passport account. If you do not have a Passport account yet, you can create one- its free and easy https://cf.passport.softwaregrp.com/hppcf/createuser.do Security Bulletin Archive: A list of recently released Security Bulletins is available here: https://softwaresupport.hpe.com/security-vulnerability Software Product Category: The Software Product Category is represented in the title by the two characters following Micro Focus Security Bulletin. 3P = 3rd Party Software GN = Micro Focus General Software MU = Multi-Platform Software System management and security procedures must be reviewed frequently to maintain system integrity. Micro Focus is continually reviewing and enhancing the security features of software products to provide customers with current secure solutions. "Micro Focus is broadly distributing this Security Bulletin in order to bring to the attention of users of the affected Micro Focus products the important security information contained in this Bulletin. Micro Focus recommends that all users determine the applicability of this information to their individual situations and take appropriate action. Micro Focus does not warrant that this information is necessarily accurate or complete for all user situations and, consequently, Micro Focus will not be responsible for any damages resulting from user's use or disregard of the information provided in this Security Bulletin. To the extent permitted by law, Micro Focus disclaims all warranties, either express or implied, including the warranties of merchantability and fitness for a particular purpose, title and non-infringement." Copyright 2017 EntIT Software LLC Micro Focus shall not be liable for technical or editorial errors or omissions contained herein. The information provided is provided "as is" without warranty of any kind. To the extent permitted by law, neither Micro Focus nor its affiliates, subcontractors or suppliers will be liable for incidental, special or consequential damages including downtime cost; lost profits; damages relating to the procurement of substitute products or services; or damages for loss of data, or software restoration. The information in this document is subject to change without notice. Micro Focus and the names of Micro Focus products referenced herein are trademarks of Micro Focus in the United States and other countries. Other product and company names mentioned herein may be trademarks of their respective owners. These vulnerabilities could be exploited remotely to create a Denial of Service (DoS), Unauthorized Read Access to Data and other impacts including: * Padding Oracle attack in Apache mod_session_crypto * Apache HTTP Request Parsing Whitespace Defects References: - CVE-2016-8740 - Apache http server, Denial of Service (DoS) - CVE-2016-2161 - Apache http server, Denial of Service (DoS) - CVE-2016-0736 - Apache http server, disclosure of information, padding oracle attack - CVE-2016-8743 - Apache http server, request corruption, request parsing white space - CVE-2016-2183 - OpenSSL, disclosure of information, SWEET32 SUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed. - HP-UX Apache-based Web Server B.11.31 - httpd prior to B.2.4.18.02 BACKGROUND CVSS Base Metrics ================= Reference, CVSS V3 Score/Vector, CVSS V2 Score/Vector CVE-2016-0736 0.0 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N 4.4 (AV:L/AC:M/Au:N/C:P/I:P/A:P) CVE-2016-2161 0.0 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N 4.4 (AV:L/AC:M/Au:N/C:P/I:P/A:P) CVE-2016-2183 5.3 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N 5.0 (AV:N/AC:L/Au:N/C:P/I:N/A:N) CVE-2016-8740 7.5 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H 5.0 (AV:N/AC:L/Au:N/C:N/I:N/A:P) CVE-2016-8743 0.0 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N 4.4 (AV:L/AC:M/Au:N/C:P/I:P/A:P) Information on CVSS is documented in HPE Customer Notice HPSN-2008-002 here: https://h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c01345499 RESOLUTION HPE has provided the following software updates to resolve the vulnerabilities with HP-UX Web Server Suite running Apache. Apache 2.4.18.02 for HP-UX Release B.11.31 (PA and IA): * 32 bit Depot: HP-UX 11.31(HPUXWS24ATW-B503-11-31-64.depot) * 64 bit Depot: HP-UX 11.31(HPUXWS24ATW-B503-11-31-32.depot) **Note:** The depot files can be found here: <https://h20392.www2.hpe.com/portal/swdepot/displayProductInfo.do?productNumb r=HPUXWSATW503> MANUAL ACTIONS: Yes - Update Download and install the software update PRODUCT SPECIFIC INFORMATION HP-UX Software Assistant: HP-UX Software Assistant is an enhanced application that replaces HP-UX Security Patch Check. It analyzes all Security Bulletins issued by HPE and lists recommended actions that may apply to a specific HP-UX system. It can also download patches and create a depot automatically. 3C = 3COM 3P = 3rd Party Software GN = HPE General Software HF = HPE Hardware and Firmware MU = Multi-Platform Software NS = NonStop Servers OV = OpenVMS PV = ProCurve ST = Storage Software UX = HP-UX Copyright 2016 Hewlett Packard Enterprise Hewlett Packard Enterprise shall not be liable for technical or editorial errors or omissions contained herein. ========================================================================== Ubuntu Security Notice USN-3198-1 February 16, 2017 openjdk-6 vulnerabilities ========================================================================== A security issue affects these releases of Ubuntu and its derivatives: - Ubuntu 12.04 LTS Summary: Several security issues were fixed in OpenJDK 6. Software Description: - openjdk-6: Open Source Java implementation Details: Karthik Bhargavan and Gaetan Leurent discovered that the DES and Triple DES ciphers were vulnerable to birthday attacks. This update moves those algorithms to the legacy algorithm set and causes them to be used only if no non-legacy algorithms can be negotiated. (CVE-2016-2183) It was discovered that OpenJDK accepted ECSDA signatures using non-canonical DER encoding. An attacker could use this to modify or expose sensitive data. (CVE-2016-5546) It was discovered that covert timing channel vulnerabilities existed in the DSA implementations in OpenJDK. A remote attacker could use this to expose sensitive information. (CVE-2016-5548) It was discovered that the URLStreamHandler class in OpenJDK did not properly parse user information from a URL. A remote attacker could use this to expose sensitive information. (CVE-2016-5552) It was discovered that the URLClassLoader class in OpenJDK did not properly check access control context when downloading class files. A remote attacker could use this to expose sensitive information. (CVE-2017-3231) It was discovered that the Remote Method Invocation (RMI) implementation in OpenJDK performed deserialization of untrusted inputs. A remote attacker could use this to execute arbitrary code. (CVE-2017-3241) It was discovered that the Java Authentication and Authorization Service (JAAS) component of OpenJDK did not properly perform user search LDAP queries. An attacker could use a specially constructed LDAP entry to expose or modify sensitive information. (CVE-2017-3252) It was discovered that the PNGImageReader class in OpenJDK did not properly handle iTXt and zTXt chunks. An attacker could use this to cause a denial of service (memory consumption). (CVE-2017-3253) It was discovered that integer overflows existed in the SocketInputStream and SocketOutputStream classes of OpenJDK. An attacker could use this to expose sensitive information. (CVE-2017-3261) It was discovered that the atomic field updaters in the java.util.concurrent.atomic package in OpenJDK did not properly restrict access to protected field members. An attacker could use this to specially craft a Java application or applet that could bypass Java sandbox restrictions. (CVE-2017-3272) Update instructions: The problem can be corrected by updating your system to the following package versions: Ubuntu 12.04 LTS: icedtea-6-jre-cacao 6b41-1.13.13-0ubuntu0.12.04.1 icedtea-6-jre-jamvm 6b41-1.13.13-0ubuntu0.12.04.1 openjdk-6-jdk 6b41-1.13.13-0ubuntu0.12.04.1 openjdk-6-jre 6b41-1.13.13-0ubuntu0.12.04.1 openjdk-6-jre-headless 6b41-1.13.13-0ubuntu0.12.04.1 openjdk-6-jre-lib 6b41-1.13.13-0ubuntu0.12.04.1 openjdk-6-jre-zero 6b41-1.13.13-0ubuntu0.12.04.1 This update uses a new upstream release, which includes additional bug fixes. After a standard system update you need to restart any Java applications or applets to make all the necessary changes

Trust: 1.44

sources: NVD: CVE-2016-2183 // VULHUB: VHN-91002 // PACKETSTORM: 154650 // PACKETSTORM: 145017 // PACKETSTORM: 147581 // PACKETSTORM: 141862 // PACKETSTORM: 141111

AFFECTED PRODUCTS

vendor:redhatmodel:jboss enterprise web serverscope:eqversion:1.0.0

Trust: 1.6

vendor:redhatmodel:enterprise linuxscope:eqversion:5.0

Trust: 1.6

vendor:redhatmodel:jboss web serverscope:eqversion:3.0

Trust: 1.6

vendor:redhatmodel:jboss enterprise application platformscope:eqversion:6.0.0

Trust: 1.6

vendor:redhatmodel:jboss enterprise web serverscope:eqversion:2.0.0

Trust: 1.6

vendor:redhatmodel:enterprise linuxscope:eqversion:7.0

Trust: 1.0

vendor:pythonmodel:pythonscope:gteversion:2.7.0

Trust: 1.0

vendor:opensslmodel:opensslscope:eqversion:1.0.1p

Trust: 1.0

vendor:redhatmodel:enterprise linuxscope:eqversion:6.0

Trust: 1.0

vendor:opensslmodel:opensslscope:eqversion:1.0.1f

Trust: 1.0

vendor:ciscomodel:content security management appliancescope:eqversion:9.7.0-006

Trust: 1.0

vendor:nodejsmodel:node.jsscope:gteversion:6.0.0

Trust: 1.0

vendor:nodejsmodel:node.jsscope:gteversion:0.10.0

Trust: 1.0

vendor:opensslmodel:opensslscope:eqversion:1.0.1l

Trust: 1.0

vendor:opensslmodel:opensslscope:eqversion:1.0.1d

Trust: 1.0

vendor:opensslmodel:opensslscope:eqversion:1.0.1c

Trust: 1.0

vendor:pythonmodel:pythonscope:ltversion:3.4.7

Trust: 1.0

vendor:opensslmodel:opensslscope:eqversion:1.0.2d

Trust: 1.0

vendor:opensslmodel:opensslscope:eqversion:1.0.1g

Trust: 1.0

vendor:opensslmodel:opensslscope:eqversion:1.0.2b

Trust: 1.0

vendor:opensslmodel:opensslscope:eqversion:1.0.2c

Trust: 1.0

vendor:pythonmodel:pythonscope:ltversion:2.7.13

Trust: 1.0

vendor:opensslmodel:opensslscope:eqversion:1.0.1q

Trust: 1.0

vendor:nodejsmodel:node.jsscope:ltversion:0.10.47

Trust: 1.0

vendor:oraclemodel:databasescope:eqversion:11.2.0.4

Trust: 1.0

vendor:opensslmodel:opensslscope:eqversion:1.0.1t

Trust: 1.0

vendor:opensslmodel:opensslscope:eqversion:1.0.2e

Trust: 1.0

vendor:nodejsmodel:node.jsscope:ltversion:4.1.2

Trust: 1.0

vendor:ciscomodel:content security management appliancescope:eqversion:9.6.6-068

Trust: 1.0

vendor:nodejsmodel:node.jsscope:gteversion:4.0.0

Trust: 1.0

vendor:opensslmodel:opensslscope:eqversion:1.0.1b

Trust: 1.0

vendor:nodejsmodel:node.jsscope:ltversion:0.12.16

Trust: 1.0

vendor:pythonmodel:pythonscope:gteversion:3.4.0

Trust: 1.0

vendor:nodejsmodel:node.jsscope:gteversion:0.12.0

Trust: 1.0

vendor:pythonmodel:pythonscope:gteversion:3.5.0

Trust: 1.0

vendor:opensslmodel:opensslscope:eqversion:1.0.2h

Trust: 1.0

vendor:opensslmodel:opensslscope:eqversion:1.0.1h

Trust: 1.0

vendor:nodejsmodel:node.jsscope:ltversion:4.6.0

Trust: 1.0

vendor:nodejsmodel:node.jsscope:gteversion:4.2.0

Trust: 1.0

vendor:nodejsmodel:node.jsscope:ltversion:6.7.0

Trust: 1.0

vendor:opensslmodel:opensslscope:eqversion:1.0.1j

Trust: 1.0

vendor:oraclemodel:databasescope:eqversion:12.1.0.2

Trust: 1.0

vendor:pythonmodel:pythonscope:ltversion:3.5.3

Trust: 1.0

vendor:opensslmodel:opensslscope:eqversion:1.0.1o

Trust: 1.0

vendor:opensslmodel:opensslscope:eqversion:1.0.1e

Trust: 1.0

vendor:opensslmodel:opensslscope:eqversion:1.0.1a

Trust: 1.0

vendor:opensslmodel:opensslscope:eqversion:1.0.2f

Trust: 1.0

vendor:opensslmodel:opensslscope:eqversion:1.0.1i

Trust: 1.0

vendor:opensslmodel:opensslscope:eqversion:1.0.1r

Trust: 1.0

vendor:opensslmodel:opensslscope:eqversion:1.0.1k

Trust: 1.0

vendor:opensslmodel:opensslscope:eqversion:1.0.1n

Trust: 1.0

vendor:opensslmodel:opensslscope:eqversion:1.0.2a

Trust: 1.0

vendor:opensslmodel:opensslscope:eqversion:1.0.1m

Trust: 1.0

sources: CNNVD: CNNVD-201608-448 // NVD: CVE-2016-2183

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2016-2183
value: HIGH

Trust: 1.0

CNNVD: CNNVD-201608-448
value: HIGH

Trust: 0.6

VULHUB: VHN-91002
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2016-2183
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:P/I:N/A:N
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 10.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.0

VULHUB: VHN-91002
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:P/I:N/A:N
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 10.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

nvd@nist.gov: CVE-2016-2183
baseSeverity: HIGH
baseScore: 7.5
vectorString: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 3.9
impactScore: 3.6
version: 3.1

Trust: 1.0

sources: VULHUB: VHN-91002 // CNNVD: CNNVD-201608-448 // NVD: CVE-2016-2183

PROBLEMTYPE DATA

problemtype:CWE-200

Trust: 1.1

sources: VULHUB: VHN-91002 // NVD: CVE-2016-2183

THREAT TYPE

remote

Trust: 0.7

sources: PACKETSTORM: 141111 // CNNVD: CNNVD-201608-448

TYPE

information disclosure

Trust: 0.6

sources: CNNVD: CNNVD-201608-448

EXPLOIT AVAILABILITY

sources: VULHUB: VHN-91002

PATCH

title:DES and Triple DES Repair measures for information disclosure vulnerabilitiesurl:http://123.124.177.30/web/xxk/bdxqById.tag?id=89481

Trust: 0.6

sources: CNNVD: CNNVD-201608-448

EXTERNAL IDS

db:NVDid:CVE-2016-2183

Trust: 2.2

db:PACKETSTORMid:142756

Trust: 1.7

db:ICS CERTid:ICSMA-18-058-02

Trust: 1.7

db:SECTRACKid:1036696

Trust: 1.7

db:PULSESECUREid:SA40312

Trust: 1.7

db:BIDid:92630

Trust: 1.7

db:BIDid:95568

Trust: 1.7

db:TENABLEid:TNS-2017-09

Trust: 1.7

db:TENABLEid:TNS-2016-21

Trust: 1.7

db:TENABLEid:TNS-2016-20

Trust: 1.7

db:TENABLEid:TNS-2016-16

Trust: 1.7

db:MCAFEEid:SB10197

Trust: 1.7

db:MCAFEEid:SB10310

Trust: 1.7

db:MCAFEEid:SB10186

Trust: 1.7

db:MCAFEEid:SB10215

Trust: 1.7

db:MCAFEEid:SB10171

Trust: 1.7

db:SIEMENSid:SSA-412672

Trust: 1.7

db:JUNIPERid:JSA10759

Trust: 1.7

db:EXPLOIT-DBid:42091

Trust: 1.7

db:PACKETSTORMid:161320

Trust: 0.7

db:PACKETSTORMid:156451

Trust: 0.7

db:PACKETSTORMid:152978

Trust: 0.7

db:PACKETSTORMid:159431

Trust: 0.7

db:CNNVDid:CNNVD-201608-448

Trust: 0.7

db:AUSCERTid:ESB-2020.1734

Trust: 0.6

db:AUSCERTid:ESB-2019.4645

Trust: 0.6

db:AUSCERTid:ESB-2021.2555

Trust: 0.6

db:AUSCERTid:ESB-2018.0025.4

Trust: 0.6

db:AUSCERTid:ESB-2022.0696

Trust: 0.6

db:AUSCERTid:ESB-2020.1734.2

Trust: 0.6

db:AUSCERTid:ESB-2019.0946

Trust: 0.6

db:AUSCERTid:ESB-2021.0437

Trust: 0.6

db:AUSCERTid:ESB-2019.1808

Trust: 0.6

db:AUSCERTid:ESB-2020.3421

Trust: 0.6

db:AUSCERTid:ESB-2020.0965

Trust: 0.6

db:AUSCERTid:ESB-2021.0940

Trust: 0.6

db:AUSCERTid:ESB-2022.2853

Trust: 0.6

db:AUSCERTid:ESB-2019.0668

Trust: 0.6

db:AUSCERTid:ESB-2020.0586

Trust: 0.6

db:ICS CERTid:ICSA-21-075-02

Trust: 0.6

db:ICS CERTid:ICSA-22-160-01

Trust: 0.6

db:PACKETSTORMid:163690

Trust: 0.6

db:PACKETSTORMid:141111

Trust: 0.2

db:PACKETSTORMid:145017

Trust: 0.2

db:PACKETSTORMid:147581

Trust: 0.2

db:PACKETSTORMid:154650

Trust: 0.2

db:PACKETSTORMid:148410

Trust: 0.1

db:PACKETSTORMid:141352

Trust: 0.1

db:PACKETSTORMid:140708

Trust: 0.1

db:PACKETSTORMid:143970

Trust: 0.1

db:PACKETSTORMid:150303

Trust: 0.1

db:PACKETSTORMid:140718

Trust: 0.1

db:PACKETSTORMid:143244

Trust: 0.1

db:PACKETSTORMid:141100

Trust: 0.1

db:PACKETSTORMid:140473

Trust: 0.1

db:PACKETSTORMid:141354

Trust: 0.1

db:PACKETSTORMid:144865

Trust: 0.1

db:PACKETSTORMid:143549

Trust: 0.1

db:PACKETSTORMid:141555

Trust: 0.1

db:PACKETSTORMid:140725

Trust: 0.1

db:PACKETSTORMid:144869

Trust: 0.1

db:PACKETSTORMid:142340

Trust: 0.1

db:PACKETSTORMid:140084

Trust: 0.1

db:PACKETSTORMid:140977

Trust: 0.1

db:PACKETSTORMid:145018

Trust: 0.1

db:PACKETSTORMid:141353

Trust: 0.1

db:VULHUBid:VHN-91002

Trust: 0.1

db:PACKETSTORMid:141862

Trust: 0.1

sources: VULHUB: VHN-91002 // PACKETSTORM: 154650 // PACKETSTORM: 145017 // PACKETSTORM: 147581 // PACKETSTORM: 141862 // PACKETSTORM: 141111 // CNNVD: CNNVD-201608-448 // NVD: CVE-2016-2183

REFERENCES

url:http://www.securityfocus.com/bid/92630

Trust: 2.9

url:https://access.redhat.com/security/cve/cve-2016-2183

Trust: 2.5

url:http://www.securityfocus.com/bid/95568

Trust: 2.3

url:https://access.redhat.com/errata/rhsa-2019:1245

Trust: 2.3

url:https://access.redhat.com/errata/rhsa-2020:0451

Trust: 2.3

url:https://www.oracle.com/security-alerts/cpuoct2021.html

Trust: 2.3

url:https://access.redhat.com/errata/rhsa-2017:3239

Trust: 1.8

url:https://access.redhat.com/errata/rhsa-2019:2859

Trust: 1.8

url:http://www.ubuntu.com/usn/usn-3198-1

Trust: 1.8

url:http://www.securitytracker.com/id/1036696

Trust: 1.7

url:http://www.securityfocus.com/archive/1/539885/100/0/threaded

Trust: 1.7

url:http://www.securityfocus.com/archive/1/archive/1/539885/100/0/threaded

Trust: 1.7

url:http://www.securityfocus.com/archive/1/archive/1/540129/100/0/threaded

Trust: 1.7

url:http://www.securityfocus.com/archive/1/540341/100/0/threaded

Trust: 1.7

url:http://www.securityfocus.com/archive/1/archive/1/540341/100/0/threaded

Trust: 1.7

url:http://seclists.org/fulldisclosure/2017/may/105

Trust: 1.7

url:http://seclists.org/fulldisclosure/2017/jul/31

Trust: 1.7

url:http://www.securityfocus.com/archive/1/541104/100/0/threaded

Trust: 1.7

url:http://www.securityfocus.com/archive/1/archive/1/541104/100/0/threaded

Trust: 1.7

url:http://www.securityfocus.com/archive/1/542005/100/0/threaded

Trust: 1.7

url:http://www.securityfocus.com/archive/1/archive/1/542005/100/0/threaded

Trust: 1.7

url:https://seclists.org/bugtraq/2018/nov/21

Trust: 1.7

url:https://www.exploit-db.com/exploits/42091/

Trust: 1.7

url:http://www.debian.org/security/2016/dsa-3673

Trust: 1.7

url:https://security.gentoo.org/glsa/201612-16

Trust: 1.7

url:https://security.gentoo.org/glsa/201701-65

Trust: 1.7

url:https://security.gentoo.org/glsa/201707-01

Trust: 1.7

url:http://rhn.redhat.com/errata/rhsa-2017-0336.html

Trust: 1.7

url:http://rhn.redhat.com/errata/rhsa-2017-0337.html

Trust: 1.7

url:http://rhn.redhat.com/errata/rhsa-2017-0338.html

Trust: 1.7

url:http://rhn.redhat.com/errata/rhsa-2017-0462.html

Trust: 1.7

url:https://access.redhat.com/errata/rhsa-2017:1216

Trust: 1.7

url:https://access.redhat.com/errata/rhsa-2017:2708

Trust: 1.7

url:https://access.redhat.com/errata/rhsa-2017:2709

Trust: 1.7

url:https://access.redhat.com/errata/rhsa-2017:2710

Trust: 1.7

url:https://access.redhat.com/errata/rhsa-2017:3113

Trust: 1.7

url:https://access.redhat.com/errata/rhsa-2017:3114

Trust: 1.7

url:https://access.redhat.com/errata/rhsa-2017:3240

Trust: 1.7

url:https://access.redhat.com/errata/rhsa-2018:2123

Trust: 1.7

url:http://lists.opensuse.org/opensuse-security-announce/2016-09/msg00022.html

Trust: 1.7

url:http://lists.opensuse.org/opensuse-security-announce/2016-09/msg00024.html

Trust: 1.7

url:http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00005.html

Trust: 1.7

url:http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00011.html

Trust: 1.7

url:http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00012.html

Trust: 1.7

url:http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00013.html

Trust: 1.7

url:http://lists.opensuse.org/opensuse-security-announce/2017-01/msg00068.html

Trust: 1.7

url:http://lists.opensuse.org/opensuse-security-announce/2017-02/msg00023.html

Trust: 1.7

url:http://lists.opensuse.org/opensuse-security-announce/2017-02/msg00028.html

Trust: 1.7

url:http://lists.opensuse.org/opensuse-security-announce/2017-05/msg00076.html

Trust: 1.7

url:http://lists.opensuse.org/opensuse-security-announce/2017-10/msg00010.html

Trust: 1.7

url:http://lists.opensuse.org/opensuse-security-announce/2017-10/msg00011.html

Trust: 1.7

url:http://www.ubuntu.com/usn/usn-3087-1

Trust: 1.7

url:http://www.ubuntu.com/usn/usn-3087-2

Trust: 1.7

url:http://www.ubuntu.com/usn/usn-3179-1

Trust: 1.7

url:http://www.ubuntu.com/usn/usn-3194-1

Trust: 1.7

url:http://www.ubuntu.com/usn/usn-3270-1

Trust: 1.7

url:http://www.ubuntu.com/usn/usn-3372-1

Trust: 1.7

url:https://www.ietf.org/mail-archive/web/tls/current/msg04560.html

Trust: 1.7

url:http://packetstormsecurity.com/files/142756/ibm-informix-dynamic-server-dll-injection-code-execution.html

Trust: 1.7

url:http://www-01.ibm.com/support/docview.wss?uid=nas8n1021697

Trust: 1.7

url:http://www-01.ibm.com/support/docview.wss?uid=swg21991482

Trust: 1.7

url:http://www-01.ibm.com/support/docview.wss?uid=swg21995039

Trust: 1.7

url:http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20170322-01-openssl-en

Trust: 1.7

url:http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html

Trust: 1.7

url:http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html

Trust: 1.7

url:http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html

Trust: 1.7

url:http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html

Trust: 1.7

url:http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html

Trust: 1.7

url:http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2016-3090545.html

Trust: 1.7

url:http://www.oracle.com/technetwork/topics/security/ovmbulletinoct2016-3090547.html

Trust: 1.7

url:http://www.splunk.com/view/sp-caaapsv

Trust: 1.7

url:http://www.splunk.com/view/sp-caaapue

Trust: 1.7

url:https://access.redhat.com/articles/2548661

Trust: 1.7

url:https://blog.cryptographyengineering.com/2016/08/24/attack-of-week-64-bit-ciphers-in-tls/

Trust: 1.7

url:https://bto.bluecoat.com/security-advisory/sa133

Trust: 1.7

url:https://bugzilla.redhat.com/show_bug.cgi?id=1369383

Trust: 1.7

url:https://cert-portal.siemens.com/productcert/pdf/ssa-412672.pdf

Trust: 1.7

url:https://github.com/ssllabs/ssllabs-scan/issues/387#issuecomment-242514633

Trust: 1.7

url:https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c05302448

Trust: 1.7

url:https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c05309984

Trust: 1.7

url:https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c05323116

Trust: 1.7

url:https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c05349499

Trust: 1.7

url:https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c05356388

Trust: 1.7

url:https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c05369403

Trust: 1.7

url:https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c05369415

Trust: 1.7

url:https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c05385680

Trust: 1.7

url:https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c05390722

Trust: 1.7

url:https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c05390849

Trust: 1.7

url:https://ics-cert.us-cert.gov/advisories/icsma-18-058-02

Trust: 1.7

url:https://kb.pulsesecure.net/articles/pulse_security_advisories/sa40312

Trust: 1.7

url:https://nakedsecurity.sophos.com/2016/08/25/anatomy-of-a-cryptographic-collision-the-sweet32-attack/

Trust: 1.7

url:https://nodejs.org/en/blog/vulnerability/september-2016-security-releases/

Trust: 1.7

url:https://security.netapp.com/advisory/ntap-20160915-0001/

Trust: 1.7

url:https://security.netapp.com/advisory/ntap-20170119-0001/

Trust: 1.7

url:https://softwaresupport.softwaregrp.com/document/-/facetsearch/document/km03158613

Trust: 1.7

url:https://softwaresupport.softwaregrp.com/document/-/facetsearch/document/km03286178

Trust: 1.7

url:https://support.f5.com/csp/article/k13167034

Trust: 1.7

url:https://sweet32.info/

Trust: 1.7

url:https://wiki.opendaylight.org/view/security_advisories

Trust: 1.7

url:https://www.arista.com/en/support/advisories-notices/security-advisories/1749-security-advisory-24

Trust: 1.7

url:https://www.mitel.com/en-ca/support/security-advisories/mitel-product-security-advisory-17-0008

Trust: 1.7

url:https://www.nccgroup.trust/us/about-us/newsroom-and-events/blog/2016/august/new-practical-attacks-on-64-bit-block-ciphers-3des-blowfish/

Trust: 1.7

url:https://www.openssl.org/blog/blog/2016/08/24/sweet32/

Trust: 1.7

url:https://www.oracle.com/security-alerts/cpuapr2020.html

Trust: 1.7

url:https://www.oracle.com/security-alerts/cpujan2020.html

Trust: 1.7

url:https://www.oracle.com/security-alerts/cpujul2020.html

Trust: 1.7

url:https://www.oracle.com/security-alerts/cpuoct2020.html

Trust: 1.7

url:https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html

Trust: 1.7

url:https://www.sigsac.org/ccs/ccs2016/accepted-papers/

Trust: 1.7

url:https://www.tenable.com/security/tns-2016-16

Trust: 1.7

url:https://www.tenable.com/security/tns-2016-20

Trust: 1.7

url:https://www.tenable.com/security/tns-2016-21

Trust: 1.7

url:https://www.tenable.com/security/tns-2017-09

Trust: 1.7

url:https://www.teskalabs.com/blog/teskalabs-bulletin-160826-seacat-sweet32-issue

Trust: 1.7

url:http://lists.opensuse.org/opensuse-security-announce/2016-09/msg00023.html

Trust: 1.7

url:http://lists.opensuse.org/opensuse-security-announce/2016-09/msg00031.html

Trust: 1.7

url:http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00021.html

Trust: 1.7

url:http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00029.html

Trust: 1.7

url:http://lists.opensuse.org/opensuse-security-announce/2017-02/msg00003.html

Trust: 1.7

url:http://lists.opensuse.org/opensuse-security-announce/2017-02/msg00032.html

Trust: 1.7

url:http://lists.opensuse.org/opensuse-security-announce/2018-02/msg00032.html

Trust: 1.7

url:https://h20566.www2.hpe.com/hpsc/doc/public/display?doclocale=en_us&docid=emr_na-c05302448

Trust: 1.6

url:https://kc.mcafee.com/corporate/index?page=content&id=sb10310

Trust: 1.6

url:https://h20566.www2.hpe.com/hpsc/doc/public/display?doclocale=en_us&docid=emr_na-hpesbgn03765en_us

Trust: 1.6

url:http://kb.juniper.net/infocenter/index?page=content&id=jsa10759

Trust: 1.6

url:https://kc.mcafee.com/corporate/index?page=content&id=sb10171

Trust: 1.6

url:https://h20566.www2.hpe.com/hpsc/doc/public/display?doclocale=en_us&docid=emr_na-c05390849

Trust: 1.6

url:https://h20566.www2.hpe.com/hpsc/doc/public/display?doclocale=en_us&docid=emr_na-c05390722

Trust: 1.6

url:https://h20566.www2.hpe.com/hpsc/doc/public/display?doclocale=en_us&docid=emr_na-hpesbux03725en_us

Trust: 1.6

url:https://kc.mcafee.com/corporate/index?page=content&id=sb10197

Trust: 1.6

url:https://h20566.www2.hpe.com/hpsc/doc/public/display?doclocale=en_us&docid=emr_na-c05369403

Trust: 1.6

url:https://kc.mcafee.com/corporate/index?page=content&id=sb10215

Trust: 1.6

url:https://h20566.www2.hpe.com/hpsc/doc/public/display?doclocale=en_us&docid=emr_na-c05385680

Trust: 1.6

url:https://kc.mcafee.com/corporate/index?page=content&id=sb10186

Trust: 1.6

url:https://h20566.www2.hpe.com/hpsc/doc/public/display?doclocale=en_us&docid=emr_na-c05369415

Trust: 1.6

url:https://www.vicarius.io/vsociety/posts/cve-2016-2183-detection-sweet32-vulnerability

Trust: 1.0

url:https://www.vicarius.io/vsociety/posts/cve-2016-2183-mitigate-sweet32-vulnerability

Trust: 1.0

url:https://access.redhat.com/errata/rhsa-2020:3842

Trust: 0.6

url:https://access.redhat.com/errata/rhsa-2021:0308

Trust: 0.6

url:https://access.redhat.com/errata/rhsa-2021:2438

Trust: 0.6

url:https://access.redhat.com/errata/rhsa-2016:1940

Trust: 0.6

url:https://access.redhat.com/errata/rhba-2019:2581

Trust: 0.6

url:https://access.redhat.com/errata/rhsa-2017:0338

Trust: 0.6

url:https://access.redhat.com/errata/rhsa-2017:0337

Trust: 0.6

url:https://access.redhat.com/errata/rhsa-2017:0336

Trust: 0.6

url:https://access.redhat.com/errata/rhsa-2017:0462

Trust: 0.6

url:https://www.suse.com/support/update/announcement/2019/suse-su-201914246-1.html

Trust: 0.6

url:https://fortiguard.com/psirt/fg-ir-17-173

Trust: 0.6

url:http://www.ibm.com/support/docview.wss

Trust: 0.6

url:https://packetstormsecurity.com/files/159431/red-hat-security-advisory-2020-3842-01.html

Trust: 0.6

url:https://us-cert.cisa.gov/ics/advisories/icsa-22-160-01

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2019.1808/

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2019.4645/

Trust: 0.6

url:https://www.ibm.com/blogs/psirt/security-bulletin-multiple-vulnerabilities-in-ibm-java-affect-ibm-netezza-analytics/

Trust: 0.6

url:https://www.ibm.com/blogs/psirt/security-bulletin-multiple-vulnerabilities-in-ibm-java-affect-ibm-netezza-analytics-for-nps/

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2020.0586/

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2021.0437

Trust: 0.6

url:https://www.ibm.com/blogs/psirt/security-bulletin-ibm-planning-analytics-has-addressed-a-security-vulnerability-cve-2016-2183/

Trust: 0.6

url:https://us-cert.cisa.gov/ics/advisories/icsa-21-075-02

Trust: 0.6

url:https://packetstormsecurity.com/files/161320/red-hat-security-advisory-2021-0308-01.html

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2020.1734/

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2018.0025.4/

Trust: 0.6

url:https://packetstormsecurity.com/files/152978/red-hat-security-advisory-2019-1245-01.html

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2022.2853

Trust: 0.6

url:http://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20160927-openssl

Trust: 0.6

url:https://www.auscert.org.au/bulletins/77618

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2022.0696

Trust: 0.6

url:https://www.auscert.org.au/bulletins/76446

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2020.0965/

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2021.0940

Trust: 0.6

url:https://www.ibm.com/blogs/psirt/security-bulletin-multiple-vulnerabilities-in-ibm-java-jre-8-0-1-1-affect-ibm-netezza-platform-software-clients/

Trust: 0.6

url:https://packetstormsecurity.com/files/163690/red-hat-security-advisory-2021-2438-01.html

Trust: 0.6

url:https://packetstormsecurity.com/files/156451/red-hat-security-advisory-2020-0451-01.html

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2021.2555

Trust: 0.6

url:https://www-01.ibm.com/support/docview.wss?uid=ibm10876602

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2020.3421/

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2020.1734.2/

Trust: 0.6

url:https://nvd.nist.gov/vuln/detail/cve-2016-2183

Trust: 0.5

url:https://www.redhat.com/mailman/listinfo/rhsa-announce

Trust: 0.2

url:https://bugzilla.redhat.com/):

Trust: 0.2

url:https://access.redhat.com/security/team/contact/

Trust: 0.2

url:http://kb.juniper.net/infocenter/index?page=content&amp;id=jsa10759

Trust: 0.1

url:https://h20566.www2.hpe.com/hpsc/doc/public/display?doclocale=en_us&amp;docid=emr_na-c05302448

Trust: 0.1

url:https://h20566.www2.hpe.com/hpsc/doc/public/display?doclocale=en_us&amp;docid=emr_na-c05369403

Trust: 0.1

url:https://h20566.www2.hpe.com/hpsc/doc/public/display?doclocale=en_us&amp;docid=emr_na-c05369415

Trust: 0.1

url:https://h20566.www2.hpe.com/hpsc/doc/public/display?doclocale=en_us&amp;docid=emr_na-c05385680

Trust: 0.1

url:https://h20566.www2.hpe.com/hpsc/doc/public/display?doclocale=en_us&amp;docid=emr_na-c05390722

Trust: 0.1

url:https://h20566.www2.hpe.com/hpsc/doc/public/display?doclocale=en_us&amp;docid=emr_na-c05390849

Trust: 0.1

url:https://h20566.www2.hpe.com/hpsc/doc/public/display?doclocale=en_us&amp;docid=emr_na-hpesbgn03765en_us

Trust: 0.1

url:https://h20566.www2.hpe.com/hpsc/doc/public/display?doclocale=en_us&amp;docid=emr_na-hpesbux03725en_us

Trust: 0.1

url:https://kc.mcafee.com/corporate/index?page=content&amp;id=sb10171

Trust: 0.1

url:https://kc.mcafee.com/corporate/index?page=content&amp;id=sb10186

Trust: 0.1

url:https://kc.mcafee.com/corporate/index?page=content&amp;id=sb10197

Trust: 0.1

url:https://kc.mcafee.com/corporate/index?page=content&amp;id=sb10215

Trust: 0.1

url:https://kc.mcafee.com/corporate/index?page=content&amp;id=sb10310

Trust: 0.1

url:https://access.redhat.com/security/updates/classification/#moderate

Trust: 0.1

url:https://docs.openshift.com/container-platform/4.1/release_notes/ocp-4-1-rel

Trust: 0.1

url:https://access.redhat.com/documentation/en/jboss-enterprise-application-platform/

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2017-9798

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2017-9798

Trust: 0.1

url:https://access.redhat.com/articles/3229231

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2017-9788

Trust: 0.1

url:https://access.redhat.com/jbossnetwork/restricted/listsoftware.html?product=appplatform&downloadtype=securitypatches&version=6.4

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2017-9788

Trust: 0.1

url:https://access.redhat.com/security/updates/classification/#important

Trust: 0.1

url:https://www.microfocus.com/support-and-services/report-security

Trust: 0.1

url:https://softwaresupport.hpe.com/group/softwaresupport/email-notification/-/subscriptions/registerdocumentnotification

Trust: 0.1

url:https://h22255.www2.hpe.com/mysoftware/index>

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2016-6329

Trust: 0.1

url:https://cf.passport.softwaregrp.com/hppcf/createuser.do

Trust: 0.1

url:https://softwaresupport.hpe.com/security-vulnerability

Trust: 0.1

url:http://softwaresupport.softwaregrp.com/group/softwaresupport/search-result/-

Trust: 0.1

url:https://softwaresupport.hpe.com/document/-/facetsearch/document/km03158613

Trust: 0.1

url:http://www.hpe.com/support/security_bulletin_archive

Trust: 0.1

url:https://www.hpe.com/info/report-security-vulnerability

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2016-8740

Trust: 0.1

url:https://h20564.www2.hpe.com/hpsc/doc/public/display?docid=emr_na-hpesbux03725en_us

Trust: 0.1

url:https://h20564.www2.hpe.com/hpsc/doc/public/display?docid=emr_na-c01345499

Trust: 0.1

url:https://h20392.www2.hpe.com/portal/swdepot/displayproductinfo.do?productnumb

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2016-2161

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2016-0736

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2016-8743

Trust: 0.1

url:http://www.hpe.com/support/subscriber_choice

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2016-5548

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2016-5552

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2017-3252

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/openjdk-6/6b41-1.13.13-0ubuntu0.12.04.1

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2017-3253

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2017-3261

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2017-3272

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2017-3241

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2017-3231

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2016-5546

Trust: 0.1

sources: VULHUB: VHN-91002 // PACKETSTORM: 154650 // PACKETSTORM: 145017 // PACKETSTORM: 147581 // PACKETSTORM: 141862 // PACKETSTORM: 141111 // CNNVD: CNNVD-201608-448 // NVD: CVE-2016-2183

CREDITS

Red Hat,Karthik Bhargavan and Gaetan Leurent from Inria.,The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerabilities that are described in this advisory.

Trust: 0.6

sources: CNNVD: CNNVD-201608-448

SOURCES

db:VULHUBid:VHN-91002
db:PACKETSTORMid:154650
db:PACKETSTORMid:145017
db:PACKETSTORMid:147581
db:PACKETSTORMid:141862
db:PACKETSTORMid:141111
db:CNNVDid:CNNVD-201608-448
db:NVDid:CVE-2016-2183

LAST UPDATE DATE

2025-12-22T23:25:23.039000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-91002date:2023-02-12T00:00:00
db:CNNVDid:CNNVD-201608-448date:2023-03-31T00:00:00
db:NVDid:CVE-2016-2183date:2025-04-12T10:46:40.837

SOURCES RELEASE DATE

db:VULHUBid:VHN-91002date:2016-09-01T00:00:00
db:PACKETSTORMid:154650date:2019-09-28T14:44:44
db:PACKETSTORMid:145017date:2017-11-17T00:10:36
db:PACKETSTORMid:147581date:2018-05-10T23:26:00
db:PACKETSTORMid:141862date:2017-03-30T16:04:18
db:PACKETSTORMid:141111date:2017-02-16T14:42:20
db:CNNVDid:CNNVD-201608-448date:2016-08-25T00:00:00
db:NVDid:CVE-2016-2183date:2016-09-01T00:59:00.137