Description
The DES and Triple DES ciphers, as used in the TLS, SSH, and IPSec protocols and other protocols and products, have a birthday bound of approximately four billion blocks, which makes it easier for remote attackers to obtain cleartext data via a birthday attack against a long-duration encrypted session, as demonstrated by an HTTPS session using Triple DES in CBC mode, aka a "Sweet32" attack.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-637-1 | openssl security update |
Debian DSA |
DSA-3673-1 | openssl security update |
Ubuntu USN |
USN-3087-1 | OpenSSL vulnerabilities |
Ubuntu USN |
USN-3179-1 | OpenJDK 8 vulnerabilities |
Ubuntu USN |
USN-3194-1 | OpenJDK 7 vulnerabilities |
Ubuntu USN |
USN-3198-1 | OpenJDK 6 vulnerabilities |
Ubuntu USN |
USN-3270-1 | NSS vulnerabilities |
Ubuntu USN |
USN-3372-1 | NSS vulnerability |
References
History
Mon, 31 Mar 2025 15:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Subscriptions
Cisco
Subscribe
Content Security Management Appliance
Subscribe
Nodejs
Subscribe
Node.js
Subscribe
Openssl
Subscribe
Openssl
Subscribe
Oracle
Subscribe
Database
Subscribe
Python
Subscribe
Python
Subscribe
Redhat
Subscribe
Enterprise Linux
Subscribe
Jboss Core Services
Subscribe
Jboss Enterprise Application Platform
Subscribe
Jboss Enterprise Web Server
Subscribe
Jboss Web Server
Subscribe
Network Satellite
Subscribe
Openshift
Subscribe
Quay
Subscribe
Rhel Extras
Subscribe
Status: PUBLISHED
Assigner: redhat
Published:
Updated: 2025-03-31T14:15:56.806Z
Reserved: 2016-01-29T00:00:00.000Z
Link: CVE-2016-2183
No data.
Status : Deferred
Published: 2016-09-01T00:59:00.137
Modified: 2025-04-12T10:46:40.837
Link: CVE-2016-2183
OpenCVE Enrichment
No data.
Debian DLA
Debian DSA
Ubuntu USN