First published: Thu Mar 03 2016(Updated: )
It was found that doapr_outch function in crypto/bio/b_print.c in OpenSSL 1.0.1 before 1.0.1s and 1.0.2 before 1.0.2g does not verify that a certain memory allocation succeeds, which allows remote attackers to cause a denial of service (out-of-bounds write or memory consumption) or possibly have unspecified other impact via a long string, as demonstrated by a large amount of ASN.1 data. This issues is different than <a href="https://access.redhat.com/security/cve/CVE-2016-0799">CVE-2016-0799</a>. Upstream patch: <a href="https://git.openssl.org/?p=openssl.git;a=commit;h=578b956fe741bf8e84055547b1e83c28dd902c73">https://git.openssl.org/?p=openssl.git;a=commit;h=578b956fe741bf8e84055547b1e83c28dd902c73</a>
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/openssl | <1.0.1 | 1.0.1 |
redhat/openssl | <1.0.2 | 1.0.2 |
redhat/openssl | <0:1.0.1e-48.el6_8.1 | 0:1.0.1e-48.el6_8.1 |
redhat/openssl | <0:1.0.1e-42.el6_7.5 | 0:1.0.1e-42.el6_7.5 |
redhat/openssl | <1:1.0.1e-51.el7_2.5 | 1:1.0.1e-51.el7_2.5 |
OpenSSL libcrypto | =1.0.1 | |
OpenSSL libcrypto | =1.0.1-beta1 | |
OpenSSL libcrypto | =1.0.1-beta2 | |
OpenSSL libcrypto | =1.0.1-beta3 | |
OpenSSL libcrypto | =1.0.1a | |
OpenSSL libcrypto | =1.0.1b | |
OpenSSL libcrypto | =1.0.1c | |
OpenSSL libcrypto | =1.0.1d | |
OpenSSL libcrypto | =1.0.1e | |
OpenSSL libcrypto | =1.0.1f | |
OpenSSL libcrypto | =1.0.1g | |
OpenSSL libcrypto | =1.0.1h | |
OpenSSL libcrypto | =1.0.1i | |
OpenSSL libcrypto | =1.0.1j | |
OpenSSL libcrypto | =1.0.1k | |
OpenSSL libcrypto | =1.0.1l | |
OpenSSL libcrypto | =1.0.1m | |
OpenSSL libcrypto | =1.0.1n | |
OpenSSL libcrypto | =1.0.1o | |
OpenSSL libcrypto | =1.0.1p | |
OpenSSL libcrypto | =1.0.1q | |
OpenSSL libcrypto | =1.0.1r | |
OpenSSL libcrypto | =1.0.2 | |
OpenSSL libcrypto | =1.0.2-beta1 | |
OpenSSL libcrypto | =1.0.2-beta2 | |
OpenSSL libcrypto | =1.0.2-beta3 | |
OpenSSL libcrypto | =1.0.2a | |
OpenSSL libcrypto | =1.0.2b | |
OpenSSL libcrypto | =1.0.2c | |
OpenSSL libcrypto | =1.0.2d | |
OpenSSL libcrypto | =1.0.2e | |
OpenSSL libcrypto | =1.0.2f | |
Advantech Spectre Rt Ert351 Firmware |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Appears in the following advisories)
CVE-2016-2842 has a severity rating that allows remote attackers to cause a denial of service through out-of-bounds write or memory consumption.
To fix CVE-2016-2842, update OpenSSL to version 1.0.1s or 1.0.2g or later.
CVE-2016-2842 affects OpenSSL versions 1.0.1 through 1.0.1r and 1.0.2 through 1.0.2f.
While CVE-2016-2842 primarily leads to denial of service, it could potentially expose a system to further attacks if exploited.
To mitigate CVE-2016-2842, upgrade affected software packages such as OpenSSL from the specified vulnerable versions.