First published: Fri Oct 14 2016(Updated: )
A denial of service flaw was found in OpenSSL 0.9.8, 1.0.1, 1.0.2 through 1.0.2h, and 1.1.0 in the way the TLS/SSL protocol defined processing of ALERT packets during a connection handshake. A remote attacker could use this flaw to make a TLS/SSL server consume an excessive amount of CPU and fail to accept connections from other clients.
Credit: secalert@redhat.com secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/jbcs-httpd24-httpd | <0:2.4.23-120.jbcs.el6 | 0:2.4.23-120.jbcs.el6 |
redhat/jbcs-httpd24-openssl | <1:1.0.2h-13.jbcs.el6 | 1:1.0.2h-13.jbcs.el6 |
redhat/jbcs-httpd24-httpd | <0:2.4.23-120.jbcs.el7 | 0:2.4.23-120.jbcs.el7 |
redhat/jbcs-httpd24-openssl | <1:1.0.2h-13.jbcs.el7 | 1:1.0.2h-13.jbcs.el7 |
redhat/openssl | <0:1.0.1e-48.el6_8.4 | 0:1.0.1e-48.el6_8.4 |
redhat/gnutls | <0:2.12.23-21.el6 | 0:2.12.23-21.el6 |
redhat/openssl | <1:1.0.1e-60.el7_3.1 | 1:1.0.1e-60.el7_3.1 |
redhat/tomcat6 | <0:6.0.41-17_patch_04.ep6.el6 | 0:6.0.41-17_patch_04.ep6.el6 |
redhat/tomcat7 | <0:7.0.54-25_patch_05.ep6.el6 | 0:7.0.54-25_patch_05.ep6.el6 |
redhat/tomcat6 | <0:6.0.41-17_patch_04.ep6.el7 | 0:6.0.41-17_patch_04.ep6.el7 |
redhat/tomcat7 | <0:7.0.54-25_patch_05.ep6.el7 | 0:7.0.54-25_patch_05.ep6.el7 |
redhat/log4j-eap6 | <0:1.2.16-12.redhat_3.1.ep6.el6 | 0:1.2.16-12.redhat_3.1.ep6.el6 |
redhat/tomcat7 | <0:7.0.70-22.ep7.el6 | 0:7.0.70-22.ep7.el6 |
redhat/tomcat8 | <0:8.0.36-24.ep7.el6 | 0:8.0.36-24.ep7.el6 |
redhat/tomcat-native | <0:1.2.8-10.redhat_10.ep7.el6 | 0:1.2.8-10.redhat_10.ep7.el6 |
redhat/log4j-eap6 | <0:1.2.16-12.redhat_3.1.ep6.el7 | 0:1.2.16-12.redhat_3.1.ep6.el7 |
redhat/tomcat7 | <0:7.0.70-22.ep7.el7 | 0:7.0.70-22.ep7.el7 |
redhat/tomcat8 | <0:8.0.36-24.ep7.el7 | 0:8.0.36-24.ep7.el7 |
redhat/tomcat-native | <0:1.2.8-10.redhat_10.ep7.el7 | 0:1.2.8-10.redhat_10.ep7.el7 |
debian/openssl | 1.1.1w-0+deb11u1 1.1.1w-0+deb11u2 3.0.15-1~deb12u1 3.0.14-1~deb12u2 3.4.0-2 | |
OpenSSL libcrypto | >=1.0.2<=1.0.2h | |
OpenSSL libcrypto | =0.9.8 | |
OpenSSL libcrypto | =1.0.1 | |
OpenSSL libcrypto | =1.1.0 | |
Debian | =8.0 | |
redhat enterprise Linux desktop | =6.0 | |
redhat enterprise Linux desktop | =7.0 | |
redhat enterprise Linux server | =6.0 | |
redhat enterprise Linux server | =7.0 | |
redhat enterprise Linux server aus | =7.3 | |
redhat enterprise Linux server aus | =7.4 | |
redhat enterprise Linux server aus | =7.6 | |
redhat enterprise Linux server eus | =7.3 | |
redhat enterprise Linux server eus | =7.4 | |
redhat enterprise Linux server eus | =7.5 | |
redhat enterprise Linux server eus | =7.6 | |
redhat enterprise Linux server tus | =7.3 | |
redhat enterprise Linux server tus | =7.6 | |
redhat enterprise Linux workstation | =6.0 | |
redhat enterprise Linux workstation | =7.0 | |
All of | ||
Any of | ||
redhat jboss enterprise application platform | =6.0.0 | |
redhat jboss enterprise application platform | =6.4.0 | |
Any of | ||
Red Hat Enterprise Linux | =6.0 | |
Red Hat Enterprise Linux | =7.0 | |
All of | ||
NetApp CN1610 | ||
NetApp CN1610 Firmware | ||
netapp clustered data ontap antivirus connector | ||
IBM Data ONTAP | ||
NetApp Data ONTAP Edge | ||
NetApp E-Series SANtricity OS Controller | >=11.0<=11.40 | |
netapp host agent | ||
NetApp OnCommand Balance | ||
NetApp OnCommand Unified Manager for 7-Mode | ||
NetApp OnCommand Workflow Automation | ||
NetApp ONTAP Select Deploy Utility | ||
NetApp Service Processor | ||
netapp smi-s provider | ||
NetApp SnapCenter | ||
NetApp SnapDrive for Unix | ||
netapp storagegrid | ||
NetApp StorageGRID Webscale | ||
IBM Data ONTAP | ||
Palo Alto Networks PAN-OS | <=6.1.17 | |
Palo Alto Networks PAN-OS | >=7.0.0<=7.0.15 | |
Palo Alto Networks PAN-OS | >=7.1.0<=7.1.10 | |
Oracle Adaptive Access Manager | =11.1.2.3.0 | |
Oracle Application Testing Suite | =13.3.0.1 | |
oracle communications analytics | =12.1.1 | |
Oracle Communications IP Service Activator | =7.3.4 | |
Oracle Communications IP Service Activator | =7.4.0 | |
Oracle Core RDBMS | =11.2.0.4 | |
Oracle Core RDBMS | =12.1.0.2 | |
Oracle Core RDBMS | =12.2.0.1 | |
Oracle Core RDBMS | =18c | |
Oracle Core RDBMS | =19c | |
Oracle Enterprise Manager Ops Center | =12.3.3 | |
Oracle Enterprise Manager Ops Center | =12.4.0 | |
Oracle GoldenGate Application Adapters | =12.3.2.1.0 | |
Oracle JD Edwards EnterpriseOne Tools | =9.2 | |
Oracle PeopleSoft Enterprise PeopleTools | =8.56 | |
Oracle PeopleSoft Enterprise PeopleTools | =8.57 | |
Oracle PeopleSoft Enterprise PeopleTools | =8.58 | |
Oracle Retail Predictive Application Server | =15.0.3 | |
Oracle Retail Predictive Application Server | =16.0.3 | |
Oracle TimesTen In-Memory Database | <18.1.4.1.0 | |
Oracle WebLogic Server | =10.3.6.0.0 | |
Oracle WebLogic Server | =12.1.3.0.0 | |
Oracle WebLogic Server | =12.2.1.3.0 | |
Oracle WebLogic Server | =12.2.1.4.0 | |
All of | ||
Any of | ||
Oracle Fujitsu M10-1 Firmware | <xcp2361 | |
Oracle Fujitsu M10-1 Firmware | >=xcp3000<xcp3070 | |
Oracle Fujitsu M10-1 | ||
All of | ||
Any of | ||
Oracle Fujitsu M10-4 Firmware | <xcp2361 | |
Oracle Fujitsu M10-4 Firmware | >=xcp3000<xcp3070 | |
Oracle Fujitsu M10-4 | ||
All of | ||
Any of | ||
fujitsu m10-4s firmware | <xcp2361 | |
fujitsu m10-4s firmware | >=xcp3000<xcp3070 | |
fujitsu m10-4s | ||
All of | ||
Any of | ||
Oracle Fujitsu M12-1 Firmware | <xcp2361 | |
Oracle Fujitsu M12-1 Firmware | >=xcp3000<xcp3070 | |
Oracle Fujitsu M12-1 Firmware | ||
All of | ||
Any of | ||
Oracle Fujitsu M12-2 Firmware | <xcp2361 | |
Oracle Fujitsu M12-2 Firmware | >=xcp3000<xcp3070 | |
fujitsu m12-2 | ||
All of | ||
Any of | ||
fujitsu m12-2s firmware | <xcp2361 | |
fujitsu m12-2s firmware | >=xcp3000<xcp3070 | |
Fujitsu SPARC M12-2S | ||
redhat jboss enterprise application platform | =6.0.0 | |
redhat jboss enterprise application platform | =6.4.0 | |
Red Hat Enterprise Linux | =6.0 | |
Red Hat Enterprise Linux | =7.0 | |
NetApp CN1610 | ||
NetApp CN1610 Firmware |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Appears in the following advisories)
CVE-2016-8610 is classified as a denial of service vulnerability that can lead to excessive CPU consumption on affected OpenSSL servers.
To fix CVE-2016-8610, update OpenSSL to a version higher than 1.0.2h or apply patches provided by your Linux distribution.
CVE-2016-8610 affects OpenSSL versions 0.9.8, 1.0.1, and 1.0.2 through 1.0.2h, as well as 1.1.0.
Yes, an attacker can remotely exploit CVE-2016-8610 via crafted ALERT packets during a TLS/SSL handshake.
If immediate updates are not possible for CVE-2016-8610, consider implementing network measures to filter or block malicious traffic that exploits this vulnerability.