The AES-NI implementation in OpenSSL before 1.0.1t and 1.0.2 before 1.0.2h does not consider memory allocation during a certain padding check, which allows remote attackers to obtain sensitive cleartext information via a padding-oracle attack against an AES CBC session. NOTE: this vulnerability exists because of an incorrect fix for CVE-2013-0169.
Project Subscriptions
| Vendors | Products |
|---|---|
|
Canonical
Subscribe
|
Ubuntu Linux
Subscribe
|
|
Debian
Subscribe
|
Debian Linux
Subscribe
|
|
Google
Subscribe
|
Android
Subscribe
|
|
Hp
Subscribe
|
Helion Openstack
Subscribe
|
|
Nodejs
Subscribe
|
Node.js
Subscribe
|
|
Openssl
Subscribe
|
Openssl
Subscribe
|
|
Opensuse
Subscribe
|
|
|
Redhat
Subscribe
|
Enterprise Linux
Subscribe
Enterprise Linux Desktop
Subscribe
Enterprise Linux Hpc Node
Subscribe
Enterprise Linux Hpc Node Eus
Subscribe
Enterprise Linux Server
Subscribe
Enterprise Linux Server Aus
Subscribe
Enterprise Linux Server Eus
Subscribe
Enterprise Linux Workstation
Subscribe
Jboss Core Services
Subscribe
Rhel Eus
Subscribe
|
Advisories
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-456-1 | openssl security update |
Debian DSA |
DSA-3566-1 | openssl security update |
Ubuntu USN |
USN-2959-1 | OpenSSL vulnerabilities |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
No history.
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: redhat
Published:
Updated: 2024-08-05T23:17:50.633Z
Reserved: 2016-01-29T00:00:00
Link: CVE-2016-2107
No data.
Status : Deferred
Published: 2016-05-05T01:59:03.200
Modified: 2025-04-12T10:46:40.837
Link: CVE-2016-2107
OpenCVE Enrichment
No data.
Debian DLA
Debian DSA
Ubuntu USN