First published: Thu Apr 28 2016(Updated: )
An integer overflow flaw, leading to a buffer overflow, was found in the way the EVP_EncodeUpdate() function of OpenSSL parsed very large amounts of input data. A remote attacker could use this flaw to crash an application using OpenSSL or, possibly, execute arbitrary code with the permissions of the user running that application.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/openssl | <1.0.1 | 1.0.1 |
redhat/openssl | <1.0.2 | 1.0.2 |
redhat/openssl | <0:1.0.1e-48.el6_8.1 | 0:1.0.1e-48.el6_8.1 |
redhat/openssl | <0:1.0.1e-42.el6_7.5 | 0:1.0.1e-42.el6_7.5 |
redhat/openssl | <1:1.0.1e-51.el7_2.5 | 1:1.0.1e-51.el7_2.5 |
redhat/httpd | <0:2.2.26-54.ep6.el6 | 0:2.2.26-54.ep6.el6 |
redhat/jbcs-httpd24 | <0:1-3.jbcs.el6 | 0:1-3.jbcs.el6 |
redhat/jbcs-httpd24-openssl | <1:1.0.2h-4.jbcs.el6 | 1:1.0.2h-4.jbcs.el6 |
redhat/tomcat-native | <0:1.1.34-5.redhat_1.ep6.el6 | 0:1.1.34-5.redhat_1.ep6.el6 |
redhat/httpd22 | <0:2.2.26-56.ep6.el7 | 0:2.2.26-56.ep6.el7 |
redhat/jbcs-httpd24 | <0:1-3.jbcs.el7 | 0:1-3.jbcs.el7 |
redhat/jbcs-httpd24-openssl | <1:1.0.2h-4.jbcs.el7 | 1:1.0.2h-4.jbcs.el7 |
redhat/tomcat-native | <0:1.1.34-5.redhat_1.ep6.el7 | 0:1.1.34-5.redhat_1.ep6.el7 |
redhat enterprise Linux desktop | =6.0 | |
Red Hat Enterprise Linux HPC Node | =6 | |
redhat enterprise Linux server | =6.0 | |
redhat enterprise Linux workstation | =6.0 | |
openSUSE | =42.1 | |
openSUSE | =13.2 | |
MySQL | >=5.6.0<=5.6.30 | |
MySQL | >=5.7.0<=5.7.12 | |
redhat enterprise Linux desktop | =7.0 | |
Red Hat Enterprise Linux HPC Node | =7.0 | |
Red Hat Enterprise Linux HPC Node | =7.2 | |
redhat enterprise Linux server | =7.0 | |
redhat enterprise Linux server aus | =7.2 | |
redhat enterprise Linux server eus | =7.2 | |
redhat enterprise Linux workstation | =7.0 | |
Apple iOS and macOS | =10.11.5 | |
OpenSSL libcrypto | =1.0.1 | |
OpenSSL libcrypto | =1.0.1-beta1 | |
OpenSSL libcrypto | =1.0.1-beta2 | |
OpenSSL libcrypto | =1.0.1-beta3 | |
OpenSSL libcrypto | =1.0.1a | |
OpenSSL libcrypto | =1.0.1b | |
OpenSSL libcrypto | =1.0.1c | |
OpenSSL libcrypto | =1.0.1d | |
OpenSSL libcrypto | =1.0.1e | |
OpenSSL libcrypto | =1.0.1f | |
OpenSSL libcrypto | =1.0.1g | |
OpenSSL libcrypto | =1.0.1h | |
OpenSSL libcrypto | =1.0.1i | |
OpenSSL libcrypto | =1.0.1j | |
OpenSSL libcrypto | =1.0.1k | |
OpenSSL libcrypto | =1.0.1l | |
OpenSSL libcrypto | =1.0.1m | |
OpenSSL libcrypto | =1.0.1n | |
OpenSSL libcrypto | =1.0.1o | |
OpenSSL libcrypto | =1.0.1p | |
OpenSSL libcrypto | =1.0.1q | |
OpenSSL libcrypto | =1.0.1r | |
OpenSSL libcrypto | =1.0.1s | |
OpenSSL libcrypto | =1.0.2 | |
OpenSSL libcrypto | =1.0.2-beta1 | |
OpenSSL libcrypto | =1.0.2-beta2 | |
OpenSSL libcrypto | =1.0.2-beta3 | |
OpenSSL libcrypto | =1.0.2a | |
OpenSSL libcrypto | =1.0.2b | |
OpenSSL libcrypto | =1.0.2c | |
OpenSSL libcrypto | =1.0.2d | |
OpenSSL libcrypto | =1.0.2e | |
OpenSSL libcrypto | =1.0.2f | |
OpenSSL libcrypto | =1.0.2g | |
Debian | =8.0 | |
Ubuntu | =12.04 | |
Ubuntu | =14.04 | |
Ubuntu | =15.10 | |
Ubuntu | =16.04 | |
Node.js | >=0.10.0<0.10.45 | |
Node.js | >=0.12.0<0.12.14 | |
Node.js | >=4.0.0<=4.1.2 | |
Node.js | >=4.2.0<4.4.4 | |
Node.js | >=5.0.0<5.11.1 | |
Node.js | =6.0.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Appears in the following advisories)
CVE-2016-2105 has a critical severity rating due to its potential to allow remote code execution via a buffer overflow.
To fix CVE-2016-2105, upgrade your OpenSSL to version 1.0.1e-48.el6_8.1 or higher or 1.0.2h-4.jbcs.el6 or higher based on your system.
CVE-2016-2105 affects various versions of OpenSSL including 1.0.1 and 1.0.2 across multiple distributions like Red Hat and Ubuntu.
Yes, CVE-2016-2105 can be exploited remotely, allowing attackers to crash applications or potentially execute arbitrary code.
While updating is the best option, limiting access to services using affected OpenSSL versions may serve as a temporary workaround.