The AES-NI implementation in OpenSSL before 1.0.1t and 1.0.2 before 1.0.2h does not consider memory allocation during a certain padding check, which allows remote attackers to obtain sensitive cleartext information via a padding-oracle attack against an AES CBC session. NOTE: this vulnerability exists because of an incorrect fix for CVE-2013-0169.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
Configuration 4 (hide)
|
Configuration 5 (hide)
|
Configuration 6 (hide)
|
Configuration 7 (hide)
|
Configuration 8 (hide)
|
Configuration 9 (hide)
|
History
16 Feb 2024, 19:19
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:hp:helion_openstack:2.0:*:*:*:*:*:*:* |
cpe:2.3:a:hp:helion_openstack:2.1.0:*:*:*:*:*:*:* cpe:2.3:a:hp:helion_openstack:2.0.0:*:*:*:*:*:*:* |
References | (CONFIRM) https://cert-portal.siemens.com/productcert/pdf/ssa-412672.pdf - Third Party Advisory | |
References | () https://git.openssl.org/?p=openssl.git%3Ba=commit%3Bh=68595c0c2886e7942a14f98c17a55a88afb6c292 - Broken Link |
07 Nov 2023, 02:30
Type | Values Removed | Values Added |
---|---|---|
References |
|
|
Information
Published : 2016-05-05 01:59
Updated : 2024-02-28 15:21
NVD link : CVE-2016-2107
Mitre link : CVE-2016-2107
CVE.ORG link : CVE-2016-2107
JSON object : View
Products Affected
opensuse
- leap
- opensuse
redhat
- enterprise_linux_server_eus
- enterprise_linux_desktop
- enterprise_linux_server_aus
- enterprise_linux_server
- enterprise_linux_workstation
- enterprise_linux_hpc_node_eus
- enterprise_linux_hpc_node
- android
hp
- helion_openstack
debian
- debian_linux
nodejs
- node.js
openssl
- openssl
canonical
- ubuntu_linux