A denial of service flaw was found in OpenSSL 0.9.8, 1.0.1, 1.0.2 through 1.0.2h, and 1.1.0 in the way the TLS/SSL protocol defined processing of ALERT packets during a connection handshake. A remote attacker could use this flaw to make a TLS/SSL server consume an excessive amount of CPU and fail to accept connections from other clients.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
Configuration 4 (hide)
AND |
|
Configuration 5 (hide)
AND |
|
Configuration 6 (hide)
|
Configuration 7 (hide)
|
Configuration 8 (hide)
|
Configuration 9 (hide)
AND |
|
Configuration 10 (hide)
AND |
|
Configuration 11 (hide)
AND |
|
Configuration 12 (hide)
AND |
|
Configuration 13 (hide)
AND |
|
Configuration 14 (hide)
AND |
|
History
26 Jan 2024, 17:44
Type | Values Removed | Values Added |
---|---|---|
First Time |
Oracle application Testing Suite
Fujitsu m12-1 Oracle retail Predictive Application Server Oracle enterprise Manager Ops Center Fujitsu m12-1 Firmware Oracle communications Analytics Fujitsu m12-2s Firmware Fujitsu m10-1 Firmware Oracle core Rdbms Oracle weblogic Server Fujitsu m10-4s Oracle communications Ip Service Activator Oracle peoplesoft Enterprise Peopletools Fujitsu Fujitsu m12-2 Firmware Oracle goldengate Application Adapters Fujitsu m10-4 Firmware Oracle timesten In-memory Database Oracle adaptive Access Manager Paloaltonetworks Fujitsu m12-2 Oracle jd Edwards Enterpriseone Tools Paloaltonetworks pan-os Fujitsu m10-4s Firmware Fujitsu m10-4 Fujitsu m10-1 Fujitsu m12-2s Oracle |
|
CPE | cpe:2.3:a:oracle:communications_analytics:12.1.1:*:*:*:*:*:*:* cpe:2.3:h:fujitsu:m10-1:-:*:*:*:*:*:*:* cpe:2.3:h:fujitsu:m12-2:-:*:*:*:*:*:*:* cpe:2.3:a:oracle:weblogic_server:10.3.6.0.0:*:*:*:*:*:*:* cpe:2.3:h:fujitsu:m10-4:-:*:*:*:*:*:*:* cpe:2.3:a:oracle:core_rdbms:18c:*:*:*:*:*:*:* cpe:2.3:a:oracle:enterprise_manager_ops_center:12.4.0:*:*:*:*:*:*:* cpe:2.3:a:oracle:peoplesoft_enterprise_peopletools:8.56:*:*:*:*:*:*:* cpe:2.3:o:fujitsu:m10-4s_firmware:*:*:*:*:*:*:*:* cpe:2.3:a:oracle:enterprise_manager_ops_center:12.3.3:*:*:*:*:*:*:* cpe:2.3:a:oracle:peoplesoft_enterprise_peopletools:8.57:*:*:*:*:*:*:* cpe:2.3:a:oracle:core_rdbms:12.2.0.1:*:*:*:*:*:*:* cpe:2.3:a:oracle:weblogic_server:12.2.1.3.0:*:*:*:*:*:*:* cpe:2.3:a:oracle:goldengate_application_adapters:12.3.2.1.0:*:*:*:*:*:*:* cpe:2.3:o:fujitsu:m12-2s_firmware:*:*:*:*:*:*:*:* cpe:2.3:a:oracle:peoplesoft_enterprise_peopletools:8.58:*:*:*:*:*:*:* cpe:2.3:o:paloaltonetworks:pan-os:*:*:*:*:*:*:*:* cpe:2.3:a:oracle:application_testing_suite:13.3.0.1:*:*:*:*:*:*:* cpe:2.3:a:oracle:retail_predictive_application_server:15.0.3:*:*:*:*:*:*:* cpe:2.3:a:oracle:retail_predictive_application_server:16.0.3:*:*:*:*:*:*:* cpe:2.3:a:oracle:communications_ip_service_activator:7.4.0:*:*:*:*:*:*:* cpe:2.3:a:oracle:weblogic_server:12.1.3.0.0:*:*:*:*:*:*:* cpe:2.3:h:fujitsu:m10-4s:-:*:*:*:*:*:*:* cpe:2.3:o:fujitsu:m10-4_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:fujitsu:m10-1_firmware:*:*:*:*:*:*:*:* cpe:2.3:a:oracle:communications_ip_service_activator:7.3.4:*:*:*:*:*:*:* cpe:2.3:o:fujitsu:m12-1_firmware:*:*:*:*:*:*:*:* cpe:2.3:h:fujitsu:m12-1:-:*:*:*:*:*:*:* cpe:2.3:a:oracle:core_rdbms:12.1.0.2:*:*:*:*:*:*:* cpe:2.3:a:oracle:core_rdbms:19c:*:*:*:*:*:*:* cpe:2.3:a:oracle:weblogic_server:12.2.1.4.0:*:*:*:*:*:*:* cpe:2.3:h:fujitsu:m12-2s:-:*:*:*:*:*:*:* cpe:2.3:a:oracle:timesten_in-memory_database:*:*:*:*:*:*:*:* cpe:2.3:o:fujitsu:m12-2_firmware:*:*:*:*:*:*:*:* cpe:2.3:a:oracle:jd_edwards_enterpriseone_tools:9.2:*:*:*:*:*:*:* cpe:2.3:a:oracle:core_rdbms:11.2.0.4:*:*:*:*:*:*:* cpe:2.3:a:oracle:adaptive_access_manager:11.1.2.3.0:*:*:*:*:*:*:* |
|
References | (MISC) https://www.oracle.com/security-alerts/cpujan2020.html - Patch, Third Party Advisory | |
References | (MISC) https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html - Patch, Third Party Advisory | |
References | (MISC) https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commit%3Bh=af58be768ebb690f78530f796e92b8ae5c9a4401 - Broken Link | |
References | (MISC) https://www.oracle.com/security-alerts/cpuoct2020.html - Patch, Third Party Advisory | |
References | (MISC) https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html - Patch, Third Party Advisory | |
References | (MISC) https://www.oracle.com/security-alerts/cpujul2020.html - Patch, Third Party Advisory | |
References | (N/A) https://www.oracle.com/security-alerts/cpuapr2020.html - Patch, Third Party Advisory | |
References | (CONFIRM) https://security.paloaltonetworks.com/CVE-2016-8610 - Third Party Advisory |
Information
Published : 2017-11-13 22:29
Updated : 2024-02-28 16:04
NVD link : CVE-2016-8610
Mitre link : CVE-2016-8610
CVE.ORG link : CVE-2016-8610
JSON object : View
Products Affected
netapp
- cn1610
- host_agent
- oncommand_unified_manager
- snapcenter_server
- data_ontap_edge
- ontap_select_deploy
- service_processor
- storagegrid_webscale
- e-series_santricity_os_controller
- smi-s_provider
- clustered_data_ontap_antivirus_connector
- snapdrive
- cn1610_firmware
- oncommand_workflow_automation
- storagegrid
- oncommand_balance
- clustered_data_ontap
- data_ontap
redhat
- enterprise_linux_server
- enterprise_linux_desktop
- jboss_enterprise_application_platform
- enterprise_linux_server_tus
- enterprise_linux
- enterprise_linux_server_aus
- enterprise_linux_workstation
- enterprise_linux_server_eus
oracle
- peoplesoft_enterprise_peopletools
- communications_analytics
- adaptive_access_manager
- application_testing_suite
- weblogic_server
- goldengate_application_adapters
- enterprise_manager_ops_center
- communications_ip_service_activator
- retail_predictive_application_server
- jd_edwards_enterpriseone_tools
- timesten_in-memory_database
- core_rdbms
fujitsu
- m12-2s
- m10-4_firmware
- m12-1_firmware
- m10-4s
- m12-2
- m10-1_firmware
- m12-1
- m10-4s_firmware
- m12-2s_firmware
- m12-2_firmware
- m10-1
- m10-4
openssl
- openssl
debian
- debian_linux
paloaltonetworks
- pan-os
CWE
CWE-400
Uncontrolled Resource Consumption