First published: Thu May 05 2016(Updated: )
The X509_NAME_oneline function in crypto/x509/x509_obj.c in OpenSSL before 1.0.1t and 1.0.2 before 1.0.2h allows remote attackers to obtain sensitive information from process stack memory or cause a denial of service (buffer over-read) via crafted EBCDIC ASN.1 data.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
OpenSSL libcrypto | <=1.0.1s | |
OpenSSL libcrypto | =1.0.2 | |
OpenSSL libcrypto | =1.0.2-beta1 | |
OpenSSL libcrypto | =1.0.2-beta2 | |
OpenSSL libcrypto | =1.0.2-beta3 | |
OpenSSL libcrypto | =1.0.2a | |
OpenSSL libcrypto | =1.0.2b | |
OpenSSL libcrypto | =1.0.2c | |
OpenSSL libcrypto | =1.0.2d | |
OpenSSL libcrypto | =1.0.2e | |
OpenSSL libcrypto | =1.0.2f | |
OpenSSL libcrypto | =1.0.2g |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-2176 is considered a moderate severity vulnerability that can lead to information leakage or denial of service.
To mitigate CVE-2016-2176, upgrade to OpenSSL version 1.0.1t or later for the 1.0.1 branch, and to 1.0.2h or later for the 1.0.2 branch.
An attacker can exploit CVE-2016-2176 to perform a buffer over-read, potentially revealing sensitive information from the process stack.
CVE-2016-2176 affects OpenSSL versions before 1.0.1t and the entire 1.0.2 branch prior to 1.0.2h.
Yes, CVE-2016-2176 can be exploited by remote attackers through specially crafted EBCDIC ASN.1 data.