CVE-2016-8610
Severity
7.5HIGH
EPSS
71.1%
top 1.29%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedNov 13
Latest updateMay 13
Description
A denial of service flaw was found in OpenSSL 0.9.8, 1.0.1, 1.0.2 through 1.0.2h, and 1.1.0 in the way the TLS/SSL protocol defined processing of ALERT packets during a connection handshake. A remote attacker could use this flaw to make a TLS/SSL server consume an excessive amount of CPU and fail to accept connections from other clients.
CVSS vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:HExploitability: 3.9 | Impact: 3.6
Affected Packages28 packages
Also affects: Debian Linux 8.0, Enterprise Linux 7.3, 7.4, 7.6, 7.5
Patches
🔴Vulnerability Details
5📋Vendor Advisories
6💬Community
5Bugzilla▶
CVE-2016-8610 openssl101e: SSL/TLS libraries: Malformed plain-text ALERT packets could cause remote DoS [epel-5]↗2016-10-26
Bugzilla▶
CVE-2016-8610 openssl: SSL/TLS libraries: Malformed plain-text ALERT packets could cause remote DoS [fedora-all]↗2016-10-26
Bugzilla▶
CVE-2016-8610 gnutls: SSL/TLS libraries: Malformed plain-text ALERT packets could cause remote DoS [fedora-all]↗2016-10-26
Bugzilla▶
CVE-2016-8610 mingw-openssl: SSL/TLS libraries: Malformed plain-text ALERT packets could cause remote DoS [fedora-all]↗2016-10-26
Bugzilla
▶