First published: Thu Apr 28 2016(Updated: )
A flaw was found in the way OpenSSL encoded certain ASN.1 data structures. An attacker could use this flaw to create a specially crafted certificate which, when verified or re-encoded by OpenSSL, could cause it to crash, or execute arbitrary code using the permissions of the user running an application compiled against the OpenSSL library.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/jbcs-httpd24-httpd | <0:2.4.23-102.jbcs.el6 | 0:2.4.23-102.jbcs.el6 |
redhat/jbcs-httpd24-nghttp2 | <0:1.12.0-9.jbcs.el6 | 0:1.12.0-9.jbcs.el6 |
redhat/jbcs-httpd24-openssl | <1:1.0.2h-12.jbcs.el6 | 1:1.0.2h-12.jbcs.el6 |
redhat/jbcs-httpd24-httpd | <0:2.4.23-102.jbcs.el7 | 0:2.4.23-102.jbcs.el7 |
redhat/jbcs-httpd24-nghttp2 | <0:1.12.0-9.jbcs.el7 | 0:1.12.0-9.jbcs.el7 |
redhat/jbcs-httpd24-openssl | <1:1.0.2h-12.jbcs.el7 | 1:1.0.2h-12.jbcs.el7 |
redhat/openssl | <0:0.9.8e-40.el5_11 | 0:0.9.8e-40.el5_11 |
redhat/openssl | <0:1.0.1e-48.el6_8.1 | 0:1.0.1e-48.el6_8.1 |
redhat/openssl | <0:1.0.1e-42.el6_7.5 | 0:1.0.1e-42.el6_7.5 |
redhat/openssl | <1:1.0.1e-51.el7_2.5 | 1:1.0.1e-51.el7_2.5 |
redhat/openssl | <1.0.1 | 1.0.1 |
redhat/openssl | <1.0.2 | 1.0.2 |
Android | ||
redhat enterprise Linux desktop | =6.0 | |
Red Hat Enterprise Linux HPC Node | =6.0 | |
redhat enterprise Linux server | =6.0 | |
redhat enterprise Linux workstation | =6.0 | |
OpenSSL libcrypto | <=1.0.1n | |
OpenSSL libcrypto | =1.0.2 | |
OpenSSL libcrypto | =1.0.2-beta1 | |
OpenSSL libcrypto | =1.0.2-beta2 | |
OpenSSL libcrypto | =1.0.2-beta3 | |
OpenSSL libcrypto | =1.0.2a | |
OpenSSL libcrypto | =1.0.2b | |
redhat enterprise Linux desktop | =7.0 | |
Red Hat Enterprise Linux HPC Node | =7.0 | |
Red Hat Enterprise Linux HPC Node | =7.2 | |
redhat enterprise Linux server | =7.0 | |
redhat enterprise Linux server aus | =7.2 | |
redhat enterprise Linux server eus | =7.2 | |
redhat enterprise Linux workstation | =7.0 | |
Android | =4.0 | |
Android | =4.0.1 | |
Android | =4.0.2 | |
Android | =4.0.3 | |
Android | =4.0.4 | |
Android | =4.1 | |
Android | =4.1.2 | |
Android | =4.2 | |
Android | =4.2.1 | |
Android | =4.2.2 | |
Android | =4.3 | |
Android | =4.3.1 | |
Android | =4.4 | |
Android | =4.4.1 | |
Android | =4.4.2 | |
Android | =4.4.3 | |
Android | =5.0 | |
Android | =5.0.1 | |
Android | =5.1 | |
Android | =5.1.0 | |
Android | =6.0 | |
Android | =6.0.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Appears in the following advisories)
CVE-2016-2108 has a severity rating of High due to the potential for an attacker to execute arbitrary code.
To fix CVE-2016-2108, update the affected OpenSSL packages to the latest version as specified by your vendor.
CVE-2016-2108 affects OpenSSL versions prior to 1.0.2h and 1.0.1n.
Applications that use vulnerable versions of OpenSSL for certificate handling may be impacted by CVE-2016-2108.
Yes, CVE-2016-2108 can lead to remote code execution if exploited.