7.5

CVE-2016-8610

A denial of service flaw was found in OpenSSL 0.9.8, 1.0.1, 1.0.2 through 1.0.2h, and 1.1.0 in the way the TLS/SSL protocol defined processing of ALERT packets during a connection handshake. A remote attacker could use this flaw to make a TLS/SSL server consume an excessive amount of CPU and fail to accept connections from other clients.

Data is provided by the National Vulnerability Database (NVD)
OpenSSLOpenSSL Version >= 1.0.2 <= 1.0.2h
OpenSSLOpenSSL Version0.9.8
OpenSSLOpenSSL Version1.0.1
OpenSSLOpenSSL Version1.1.0
DebianDebian Linux Version8.0
RedhatJboss Enterprise Application Platform Version6.0.0
   RedhatEnterprise Linux Version6.0
   RedhatEnterprise Linux Version7.0
RedhatJboss Enterprise Application Platform Version6.4.0
   RedhatEnterprise Linux Version6.0
   RedhatEnterprise Linux Version7.0
NetappCn1610 Firmware Version-
   NetappCn1610 Version-
NetappData Ontap Version- SwPlatform7-mode
NetappData Ontap Edge Version-
NetappE-series Santricity Os Controller Version >= 11.0 <= 11.40
NetappHost Agent Version-
NetappOncommand Balance Version-
NetappOncommand Unified Manager Version- SwPlatform7-mode
NetappService Processor Version-
NetappSmi-s Provider Version-
NetappSnapcenter Server Version-
NetappSnapdrive Version- SwPlatformunix
NetappStoragegrid Version-
PaloaltonetworksPan-os Version <= 6.1.17
PaloaltonetworksPan-os Version >= 7.0.0 <= 7.0.15
PaloaltonetworksPan-os Version >= 7.1.0 <= 7.1.10
OracleAdaptive Access Manager Version11.1.2.3.0
OracleApplication Testing Suite Version13.3.0.1
OracleCommunications Analytics Version12.1.1
OracleCore Rdbms Version11.2.0.4
OracleCore Rdbms Version12.1.0.2
OracleCore Rdbms Version12.2.0.1
OracleCore Rdbms Version18c
OracleCore Rdbms Version19c
OracleGoldengate Application Adapters Version12.3.2.1.0
OracleTimesten In-memory Database Version < 18.1.4.1.0
OracleWeblogic Server Version10.3.6.0.0
OracleWeblogic Server Version12.1.3.0.0
OracleWeblogic Server Version12.2.1.3.0
OracleWeblogic Server Version12.2.1.4.0
FujitsuM10-1 Firmware Version < xcp2361
   FujitsuM10-1 Version-
FujitsuM10-1 Firmware Version >= xcp3000 < xcp3070
   FujitsuM10-1 Version-
FujitsuM10-4 Firmware Version < xcp2361
   FujitsuM10-4 Version-
FujitsuM10-4 Firmware Version >= xcp3000 < xcp3070
   FujitsuM10-4 Version-
FujitsuM10-4s Firmware Version < xcp2361
   FujitsuM10-4s Version-
FujitsuM10-4s Firmware Version >= xcp3000 < xcp3070
   FujitsuM10-4s Version-
FujitsuM12-1 Firmware Version < xcp2361
   FujitsuM12-1 Version-
FujitsuM12-1 Firmware Version >= xcp3000 < xcp3070
   FujitsuM12-1 Version-
FujitsuM12-2 Firmware Version < xcp2361
   FujitsuM12-2 Version-
FujitsuM12-2 Firmware Version >= xcp3000 < xcp3070
   FujitsuM12-2 Version-
FujitsuM12-2s Firmware Version < xcp2361
   FujitsuM12-2s Version-
FujitsuM12-2s Firmware Version >= xcp3000 < xcp3070
   FujitsuM12-2s Version-
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Type Source Score Percentile
EPSS FIRST.org 69.1% 0.986
CVSS Metriken
Source Base Score Exploit Score Impact Score Vector string
nvd@nist.gov 7.5 3.9 3.6
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
nvd@nist.gov 5 10 2.9
AV:N/AC:L/Au:N/C:N/I:N/A:P
CWE-400 Uncontrolled Resource Consumption

The product does not properly control the allocation and maintenance of a limited resource, thereby enabling an actor to influence the amount of resources consumed, eventually leading to the exhaustion of available resources.

http://seclists.org/oss-sec/2016/q4/224
Third Party Advisory
Mailing List
http://www.securityfocus.com/bid/93841
Third Party Advisory
VDB Entry
http://www.securitytracker.com/id/1037084
Third Party Advisory
VDB Entry
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-8610
Patch
Third Party Advisory
Issue Tracking