Public exploit available
Public proof-of-concept or exploit code exists (ExploitDB / Metasploit / Nuclei).
Severity
7.5HIGHNVD
EPSS
20.9%
top 4.35%
CISA KEV
Not in KEV
Exploit
PoC available
Public exploit / PoC exists
Affected products
Timeline
PublishedMay 4
Latest updateMay 17

Description

In OpenSSL 1.1.0 before 1.1.0c, TLS connections using *-CHACHA20-POLY1305 ciphersuites are susceptible to a DoS attack by corrupting larger payloads. This can result in an OpenSSL crash. This issue is not considered to be exploitable beyond a DoS.

CVSS vector

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:HExploitability: 3.9 | Impact: 3.6

Affected Packages4 packages

debiandebian/openssl< openssl 1.1.0c-1 (bookworm)
Debianopenssl/openssl< 1.1.0c-1+3
CVEListV5openssl/opensslopenssl-1.1.0, openssl-1.1.0a, openssl-1.1.0b+2
NVDopenssl/openssl1.1.0, 1.1.0a, 1.1.0b+2

Patches

🔴Vulnerability Details

2
GHSA
GHSA-3rqr-v2gc-jxp4: In OpenSSL 12022-05-17
OSV
CVE-2016-7054: In OpenSSL 12017-05-04

💥Exploits & PoCs

1
Exploit-DB
OpenSSL 1.1.0a/1.1.0b - Denial of Service2016-12-11

📋Vendor Advisories

4
Cisco
Multiple Vulnerabilities in OpenSSL Affecting Cisco Products: November 20162016-11-14
Red Hat
openssl: Corrupting larger payloads when using ChaCha20/Poly1305 ciphersuites leads to DoS2016-11-10
Debian
CVE-2016-7054: openssl - In OpenSSL 1.1.0 before 1.1.0c, TLS connections using *-CHACHA20-POLY1305 cipher...2016
Cisco
Multiple Vulnerabilities in OpenSSL Affecting Cisco Products: November 2016

🕵️Threat Intelligence

2
Fortinet
An Analysis of the OpenSSL SSL Handshake Error State Security Bypass (CVE-2017-3737)2018-01-12
Fortinet
Analysis of OpenSSL ChaCha20-Poly1305 Heap Buffer Overflow (CVE-2016-7054)2016-11-23

📄Research Papers

1
arXiv
Verified Low-Level Programming Embedded in F*2018-12-11

💬Community

1
Bugzilla
CVE-2016-7054 openssl: Corrupting larger payloads when using ChaCha20/Poly1305 ciphersuites leads to DoS2016-11-10
CVE-2016-7054 — Improper Access Control in Openssl | cvebase