First published: Mon Feb 22 2016(Updated: )
Double free vulnerability in the dsa_priv_decode function in crypto/dsa/dsa_ameth.c in OpenSSL 1.0.1 before 1.0.1s and 1.0.2 before 1.0.2g allows remote attackers to cause a denial of service (memory corruption) or possibly have unspecified other impact via a malformed DSA private key.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/openssl | <1.0.1 | 1.0.1 |
redhat/openssl | <1.0.2 | 1.0.2 |
MySQL | >=5.6.0<=5.6.29 | |
MySQL | >=5.7.0<=5.7.11 | |
OpenSSL libcrypto | =1.0.1 | |
OpenSSL libcrypto | =1.0.1-beta1 | |
OpenSSL libcrypto | =1.0.1-beta2 | |
OpenSSL libcrypto | =1.0.1-beta3 | |
OpenSSL libcrypto | =1.0.1a | |
OpenSSL libcrypto | =1.0.1b | |
OpenSSL libcrypto | =1.0.1c | |
OpenSSL libcrypto | =1.0.1d | |
OpenSSL libcrypto | =1.0.1e | |
OpenSSL libcrypto | =1.0.1f | |
OpenSSL libcrypto | =1.0.1g | |
OpenSSL libcrypto | =1.0.1h | |
OpenSSL libcrypto | =1.0.1i | |
OpenSSL libcrypto | =1.0.1j | |
OpenSSL libcrypto | =1.0.1k | |
OpenSSL libcrypto | =1.0.1l | |
OpenSSL libcrypto | =1.0.1m | |
OpenSSL libcrypto | =1.0.1n | |
OpenSSL libcrypto | =1.0.1o | |
OpenSSL libcrypto | =1.0.1p | |
OpenSSL libcrypto | =1.0.1q | |
OpenSSL libcrypto | =1.0.1r | |
OpenSSL libcrypto | =1.0.2 | |
OpenSSL libcrypto | =1.0.2-beta1 | |
OpenSSL libcrypto | =1.0.2-beta2 | |
OpenSSL libcrypto | =1.0.2-beta3 | |
OpenSSL libcrypto | =1.0.2a | |
OpenSSL libcrypto | =1.0.2b | |
OpenSSL libcrypto | =1.0.2c | |
OpenSSL libcrypto | =1.0.2d | |
OpenSSL libcrypto | =1.0.2e | |
OpenSSL libcrypto | =1.0.2f | |
Android | =4.0 | |
Android | =4.0.1 | |
Android | =4.0.2 | |
Android | =4.0.3 | |
Android | =4.0.4 | |
Android | =4.1 | |
Android | =4.1.2 | |
Android | =4.2 | |
Android | =4.2.1 | |
Android | =4.2.2 | |
Android | =4.3 | |
Android | =4.3.1 | |
Android | =4.4 | |
Android | =4.4.1 | |
Android | =4.4.2 | |
Android | =4.4.3 | |
Android | =5.0 | |
Android | =5.0.1 | |
Android | =5.1 | |
Android | =5.1.0 | |
Android | =6.0 | |
Android | =6.0.1 | |
Ubuntu | =12.04 | |
Ubuntu | =14.04 | |
Ubuntu | =15.10 | |
Debian | =7.0 | |
Debian | =8.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-0705 has a medium severity rating, allowing for potential denial of service (memory corruption).
To fix CVE-2016-0705, update OpenSSL to version 1.0.1s or later for 1.0.1 series or 1.0.2g or later for 1.0.2 series.
OpenSSL versions 1.0.1 before 1.0.1s and 1.0.2 before 1.0.2g are affected by CVE-2016-0705.
While CVE-2016-0705 primarily causes denial of service, it may potentially lead to data loss due to memory corruption.
Yes, CVE-2016-0705 can be exploited by remote attackers through a malformed DSA private key.