CVE-2016-2177
Severity
9.8CRITICAL
EPSS
29.1%
top 3.42%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedJun 20
Latest updateMay 13
Description
OpenSSL through 1.0.2h incorrectly uses pointer arithmetic for heap-buffer boundary checks, which might allow remote attackers to cause a denial of service (integer overflow and application crash) or possibly have unspecified other impact by leveraging unexpected malloc behavior, related to s3_srvr.c, ssl_sess.c, and t1_lib.c.
CVSS vector
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:HExploitability: 3.9 | Impact: 5.9
Affected Packages8 packages
Patches
🔴Vulnerability Details
6📋Vendor Advisories
6💬Community
5Bugzilla▶
CVE-2016-2177 openssl101e: openssl: Possible integer overflow vulnerabilities in codebase [epel-5]↗2016-06-01
Bugzilla▶
CVE-2016-2177 mingw-openssl: openssl: Possible integer overflow vulnerabilities in codebase [fedora-all]↗2016-06-01
Bugzilla▶
CVE-2016-2177 openssl: Possible integer overflow vulnerabilities in codebase [fedora-all]↗2016-06-01