Description
OpenSSL through 1.0.2h incorrectly uses pointer arithmetic for heap-buffer boundary checks, which might allow remote attackers to cause a denial of service (integer overflow and application crash) or possibly have unspecified other impact by leveraging unexpected malloc behavior, related to s3_srvr.c, ssl_sess.c, and t1_lib.c.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-637-1 | openssl security update |
Debian DSA |
DSA-3673-1 | openssl security update |
Ubuntu USN |
USN-3087-1 | OpenSSL vulnerabilities |
Ubuntu USN |
USN-3181-1 | OpenSSL vulnerabilities |
References
History
No history.
Subscriptions
Hp
Subscribe
Icewall Mcrp
Subscribe
Icewall Sso
Subscribe
Icewall Sso Agent Option
Subscribe
Openssl
Subscribe
Openssl
Subscribe
Oracle
Subscribe
Linux
Subscribe
Solaris
Subscribe
Redhat
Subscribe
Enterprise Linux
Subscribe
Jboss Core Services
Subscribe
Jboss Enterprise Application Platform
Subscribe
Status: PUBLISHED
Assigner: redhat
Published:
Updated: 2024-08-05T23:17:50.601Z
Reserved: 2016-01-29T00:00:00.000Z
Link: CVE-2016-2177
No data.
Status : Deferred
Published: 2016-06-20T01:59:02.087
Modified: 2025-04-12T10:46:40.837
Link: CVE-2016-2177
OpenCVE Enrichment
No data.
Weaknesses
Debian DLA
Debian DSA
Ubuntu USN