First published: Thu May 05 2016(Updated: )
A common idiom in the codebase is: if (p + len > limit) { return; /* Too long */ } where p points to some malloc'd data of SIZE bytes and limit == p + SIZE. 'len' could be from some externally supplied data, e.g. TLS message. This idiom is vulnerable to integer overflow vulnerability.
Credit: secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/jbcs-httpd24-httpd | <0:2.4.23-102.jbcs.el6 | 0:2.4.23-102.jbcs.el6 |
redhat/jbcs-httpd24-nghttp2 | <0:1.12.0-9.jbcs.el6 | 0:1.12.0-9.jbcs.el6 |
redhat/jbcs-httpd24-openssl | <1:1.0.2h-12.jbcs.el6 | 1:1.0.2h-12.jbcs.el6 |
redhat/jbcs-httpd24-httpd | <0:2.4.23-102.jbcs.el7 | 0:2.4.23-102.jbcs.el7 |
redhat/jbcs-httpd24-nghttp2 | <0:1.12.0-9.jbcs.el7 | 0:1.12.0-9.jbcs.el7 |
redhat/jbcs-httpd24-openssl | <1:1.0.2h-12.jbcs.el7 | 1:1.0.2h-12.jbcs.el7 |
redhat/openssl | <0:1.0.1e-48.el6_8.3 | 0:1.0.1e-48.el6_8.3 |
redhat/openssl | <1:1.0.1e-51.el7_2.7 | 1:1.0.1e-51.el7_2.7 |
redhat/jbcs-httpd24-openssl | <1:1.0.2h-13.jbcs.el6 | 1:1.0.2h-13.jbcs.el6 |
redhat/jbcs-httpd24-openssl | <1:1.0.2h-13.jbcs.el7 | 1:1.0.2h-13.jbcs.el7 |
redhat/openssl | <1.0.1 | 1.0.1 |
redhat/openssl | <1.0.2 | 1.0.2 |
debian/openssl | 1.1.1w-0+deb11u1 1.1.1w-0+deb11u2 3.0.15-1~deb12u1 3.0.14-1~deb12u2 3.4.0-2 | |
HP IceWall MCRP | =3.0 | |
HP IceWall SSO | =10.0 | |
HP IceWall SSO | =10.0 | |
HP IceWall SSO Agent Option | =10.0 | |
OpenSSL libcrypto | =1.0.1 | |
OpenSSL libcrypto | =1.0.1a | |
OpenSSL libcrypto | =1.0.1b | |
OpenSSL libcrypto | =1.0.1c | |
OpenSSL libcrypto | =1.0.1d | |
OpenSSL libcrypto | =1.0.1e | |
OpenSSL libcrypto | =1.0.1f | |
OpenSSL libcrypto | =1.0.1g | |
OpenSSL libcrypto | =1.0.1h | |
OpenSSL libcrypto | =1.0.1i | |
OpenSSL libcrypto | =1.0.1j | |
OpenSSL libcrypto | =1.0.1k | |
OpenSSL libcrypto | =1.0.1l | |
OpenSSL libcrypto | =1.0.1m | |
OpenSSL libcrypto | =1.0.1n | |
OpenSSL libcrypto | =1.0.1o | |
OpenSSL libcrypto | =1.0.1p | |
OpenSSL libcrypto | =1.0.1q | |
OpenSSL libcrypto | =1.0.1r | |
OpenSSL libcrypto | =1.0.1s | |
OpenSSL libcrypto | =1.0.1t | |
OpenSSL libcrypto | =1.0.2 | |
OpenSSL libcrypto | =1.0.2a | |
OpenSSL libcrypto | =1.0.2b | |
OpenSSL libcrypto | =1.0.2c | |
OpenSSL libcrypto | =1.0.2d | |
OpenSSL libcrypto | =1.0.2e | |
OpenSSL libcrypto | =1.0.2f | |
OpenSSL libcrypto | =1.0.2g | |
OpenSSL libcrypto | =1.0.2h | |
Oracle Linux | =5 | |
Oracle Linux | =6 | |
Oracle Linux | =7 | |
Oracle Solaris SPARC | =10 | |
Oracle Solaris SPARC | =11.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Appears in the following advisories)
CVE-2016-2177 has been assigned a medium severity rating due to its potential for integer overflow that could lead to denial of service or other vulnerabilities.
To fix CVE-2016-2177, update your affected software packages to the recommended versions as listed in the vulnerability details.
CVE-2016-2177 affects multiple versions of jbcs-httpd24-httpd, jbcs-httpd24-nghttp2, and jbcs-httpd24-openssl among others, specifically prior to their respective fixed versions.
CVE-2016-2177 is caused by an integer overflow vulnerability stemming from an improper check on input lengths that can lead to excessive memory access.
While not widely exploited in the wild, CVE-2016-2177 presents a significant risk if left unpatched, especially in systems reliant on the affected software.