cvelist/2016/2xxx/CVE-2016-2183.json

388 lines
16 KiB
JSON
Raw Normal View History

2017-10-16 12:31:07 -04:00
{
2018-01-17 21:02:46 -05:00
"CVE_data_meta" : {
"ASSIGNER" : "cve@mitre.org",
"ID" : "CVE-2016-2183",
"STATE" : "PUBLIC"
},
"affects" : {
"vendor" : {
"vendor_data" : [
{
"product" : {
"product_data" : [
{
"product_name" : "n/a",
"version" : {
"version_data" : [
{
"version_value" : "n/a"
}
]
}
}
]
},
"vendor_name" : "n/a"
Submitter: Bill Situ <Bill.Situ@oracle.com> On branch cna/oracle/jan2018cpu Changes to be committed: modified: 2013/2xxx/CVE-2013-2566.json modified: 2014/0xxx/CVE-2014-0114.json modified: 2014/7xxx/CVE-2014-7817.json modified: 2014/9xxx/CVE-2014-9402.json modified: 2015/0xxx/CVE-2015-0293.json modified: 2015/1xxx/CVE-2015-1472.json modified: 2015/2xxx/CVE-2015-2808.json modified: 2015/3xxx/CVE-2015-3195.json modified: 2015/3xxx/CVE-2015-3253.json modified: 2015/4xxx/CVE-2015-4852.json modified: 2015/7xxx/CVE-2015-7501.json modified: 2015/7xxx/CVE-2015-7547.json modified: 2015/7xxx/CVE-2015-7940.json modified: 2016/0xxx/CVE-2016-0635.json modified: 2016/0xxx/CVE-2016-0703.json modified: 2016/0xxx/CVE-2016-0704.json modified: 2016/0xxx/CVE-2016-0800.json modified: 2016/1xxx/CVE-2016-1181.json modified: 2016/1xxx/CVE-2016-1182.json modified: 2016/2xxx/CVE-2016-2105.json modified: 2016/2xxx/CVE-2016-2106.json modified: 2016/2xxx/CVE-2016-2107.json modified: 2016/2xxx/CVE-2016-2109.json modified: 2016/2xxx/CVE-2016-2177.json modified: 2016/2xxx/CVE-2016-2178.json modified: 2016/2xxx/CVE-2016-2179.json modified: 2016/2xxx/CVE-2016-2180.json modified: 2016/2xxx/CVE-2016-2181.json modified: 2016/2xxx/CVE-2016-2182.json modified: 2016/2xxx/CVE-2016-2183.json modified: 2016/2xxx/CVE-2016-2518.json modified: 2016/2xxx/CVE-2016-2550.json modified: 2016/4xxx/CVE-2016-4449.json modified: 2016/5xxx/CVE-2016-5385.json modified: 2016/5xxx/CVE-2016-5387.json modified: 2016/6xxx/CVE-2016-6302.json modified: 2016/6xxx/CVE-2016-6303.json modified: 2016/6xxx/CVE-2016-6304.json modified: 2016/6xxx/CVE-2016-6305.json modified: 2016/6xxx/CVE-2016-6306.json modified: 2016/6xxx/CVE-2016-6307.json modified: 2016/6xxx/CVE-2016-6308.json modified: 2016/6xxx/CVE-2016-6309.json modified: 2016/7xxx/CVE-2016-7052.json modified: 2016/7xxx/CVE-2016-7055.json modified: 2016/7xxx/CVE-2016-7977.json modified: 2016/8xxx/CVE-2016-8735.json modified: 2016/9xxx/CVE-2016-9878.json modified: 2017/0xxx/CVE-2017-0781.json modified: 2017/0xxx/CVE-2017-0782.json modified: 2017/0xxx/CVE-2017-0783.json modified: 2017/0xxx/CVE-2017-0785.json modified: 2017/10xxx/CVE-2017-10068.json modified: 2017/10xxx/CVE-2017-10262.json modified: 2017/10xxx/CVE-2017-10273.json modified: 2017/10xxx/CVE-2017-10282.json modified: 2017/10xxx/CVE-2017-10301.json modified: 2017/10xxx/CVE-2017-10352.json modified: 2017/12xxx/CVE-2017-12617.json modified: 2017/13xxx/CVE-2017-13077.json modified: 2017/13xxx/CVE-2017-13078.json modified: 2017/13xxx/CVE-2017-13079.json modified: 2017/13xxx/CVE-2017-13080.json modified: 2017/13xxx/CVE-2017-13081.json modified: 2017/13xxx/CVE-2017-13082.json modified: 2017/3xxx/CVE-2017-3730.json modified: 2017/3xxx/CVE-2017-3731.json modified: 2017/3xxx/CVE-2017-3732.json modified: 2017/3xxx/CVE-2017-3733.json modified: 2017/3xxx/CVE-2017-3735.json modified: 2017/3xxx/CVE-2017-3736.json modified: 2017/3xxx/CVE-2017-3737.json modified: 2017/3xxx/CVE-2017-3738.json modified: 2017/5xxx/CVE-2017-5461.json modified: 2017/5xxx/CVE-2017-5645.json modified: 2017/5xxx/CVE-2017-5664.json modified: 2017/5xxx/CVE-2017-5715.json modified: 2017/9xxx/CVE-2017-9072.json modified: 2017/9xxx/CVE-2017-9798.json modified: 2018/2xxx/CVE-2018-2560.json modified: 2018/2xxx/CVE-2018-2561.json modified: 2018/2xxx/CVE-2018-2562.json modified: 2018/2xxx/CVE-2018-2564.json modified: 2018/2xxx/CVE-2018-2565.json modified: 2018/2xxx/CVE-2018-2566.json modified: 2018/2xxx/CVE-2018-2567.json modified: 2018/2xxx/CVE-2018-2568.json modified: 2018/2xxx/CVE-2018-2569.json modified: 2018/2xxx/CVE-2018-2570.json modified: 2018/2xxx/CVE-2018-2571.json modified: 2018/2xxx/CVE-2018-2573.json modified: 2018/2xxx/CVE-2018-2574.json modified: 2018/2xxx/CVE-2018-2575.json modified: 2018/2xxx/CVE-2018-2576.json modified: 2018/2xxx/CVE-2018-2577.json modified: 2018/2xxx/CVE-2018-2578.json modified: 2018/2xxx/CVE-2018-2579.json modified: 2018/2xxx/CVE-2018-2580.json modified: 2018/2xxx/CVE-2018-2581.json modified: 2018/2xxx/CVE-2018-2582.json modified: 2018/2xxx/CVE-2018-2583.json modified: 2018/2xxx/CVE-2018-2584.json modified: 2018/2xxx/CVE-2018-2585.json modified: 2018/2xxx/CVE-2018-2586.json modified: 2018/2xxx/CVE-2018-2588.json modified: 2018/2xxx/CVE-2018-2589.json modified: 2018/2xxx/CVE-2018-2590.json modified: 2018/2xxx/CVE-2018-2591.json modified: 2018/2xxx/CVE-2018-2592.json modified: 2018/2xxx/CVE-2018-2593.json modified: 2018/2xxx/CVE-2018-2594.json modified: 2018/2xxx/CVE-2018-2595.json modified: 2018/2xxx/CVE-2018-2596.json modified: 2018/2xxx/CVE-2018-2597.json modified: 2018/2xxx/CVE-2018-2599.json modified: 2018/2xxx/CVE-2018-2600.json modified: 2018/2xxx/CVE-2018-2601.json modified: 2018/2xxx/CVE-2018-2602.json modified: 2018/2xxx/CVE-2018-2603.json modified: 2018/2xxx/CVE-2018-2604.json modified: 2018/2xxx/CVE-2018-2605.json modified: 2018/2xxx/CVE-2018-2606.json modified: 2018/2xxx/CVE-2018-2607.json modified: 2018/2xxx/CVE-2018-2608.json modified: 2018/2xxx/CVE-2018-2609.json modified: 2018/2xxx/CVE-2018-2610.json modified: 2018/2xxx/CVE-2018-2611.json modified: 2018/2xxx/CVE-2018-2612.json modified: 2018/2xxx/CVE-2018-2613.json modified: 2018/2xxx/CVE-2018-2614.json modified: 2018/2xxx/CVE-2018-2615.json modified: 2018/2xxx/CVE-2018-2616.json modified: 2018/2xxx/CVE-2018-2617.json modified: 2018/2xxx/CVE-2018-2618.json modified: 2018/2xxx/CVE-2018-2619.json modified: 2018/2xxx/CVE-2018-2620.json modified: 2018/2xxx/CVE-2018-2621.json modified: 2018/2xxx/CVE-2018-2622.json modified: 2018/2xxx/CVE-2018-2623.json modified: 2018/2xxx/CVE-2018-2624.json modified: 2018/2xxx/CVE-2018-2625.json modified: 2018/2xxx/CVE-2018-2626.json modified: 2018/2xxx/CVE-2018-2627.json modified: 2018/2xxx/CVE-2018-2629.json modified: 2018/2xxx/CVE-2018-2630.json modified: 2018/2xxx/CVE-2018-2631.json modified: 2018/2xxx/CVE-2018-2632.json modified: 2018/2xxx/CVE-2018-2633.json modified: 2018/2xxx/CVE-2018-2634.json modified: 2018/2xxx/CVE-2018-2635.json modified: 2018/2xxx/CVE-2018-2636.json modified: 2018/2xxx/CVE-2018-2637.json modified: 2018/2xxx/CVE-2018-2638.json modified: 2018/2xxx/CVE-2018-2639.json modified: 2018/2xxx/CVE-2018-2640.json modified: 2018/2xxx/CVE-2018-2641.json modified: 2018/2xxx/CVE-2018-2642.json modified: 2018/2xxx/CVE-2018-2643.json modified: 2018/2xxx/CVE-2018-2644.json modified: 2018/2xxx/CVE-2018-2645.json modified: 2018/2xxx/CVE-2018-2646.json modified: 2018/2xxx/CVE-2018-2647.json modified: 2018/2xxx/CVE-2018-2648.json modified: 2018/2xxx/CVE-2018-2649.json modified: 2018/2xxx/CVE-2018-2650.json modified: 2018/2xxx/CVE-2018-2651.json modified: 2018/2xxx/CVE-2018-2652.json modified: 2018/2xxx/CVE-2018-2653.json modified: 2018/2xxx/CVE-2018-2654.json modified: 2018/2xxx/CVE-2018-2655.json modified: 2018/2xxx/CVE-2018-2656.json modified: 2018/2xxx/CVE-2018-2657.json modified: 2018/2xxx/CVE-2018-2658.json modified: 2018/2xxx/CVE-2018-2659.json modified: 2018/2xxx/CVE-2018-2660.json modified: 2018/2xxx/CVE-2018-2661.json modified: 2018/2xxx/CVE-2018-2662.json modified: 2018/2xxx/CVE-2018-2663.json modified: 2018/2xxx/CVE-2018-2664.json modified: 2018/2xxx/CVE-2018-2665.json modified: 2018/2xxx/CVE-2018-2666.json modified: 2018/2xxx/CVE-2018-2667.json modified: 2018/2xxx/CVE-2018-2668.json modified: 2018/2xxx/CVE-2018-2669.json modified: 2018/2xxx/CVE-2018-2670.json modified: 2018/2xxx/CVE-2018-2671.json modified: 2018/2xxx/CVE-2018-2672.json modified: 2018/2xxx/CVE-2018-2673.json modified: 2018/2xxx/CVE-2018-2674.json modified: 2018/2xxx/CVE-2018-2675.json modified: 2018/2xxx/CVE-2018-2676.json modified: 2018/2xxx/CVE-2018-2677.json modified: 2018/2xxx/CVE-2018-2678.json modified: 2018/2xxx/CVE-2018-2679.json modified: 2018/2xxx/CVE-2018-2680.json modified: 2018/2xxx/CVE-2018-2681.json modified: 2018/2xxx/CVE-2018-2682.json modified: 2018/2xxx/CVE-2018-2683.json modified: 2018/2xxx/CVE-2018-2684.json modified: 2018/2xxx/CVE-2018-2685.json modified: 2018/2xxx/CVE-2018-2686.json modified: 2018/2xxx/CVE-2018-2687.json modified: 2018/2xxx/CVE-2018-2688.json modified: 2018/2xxx/CVE-2018-2689.json modified: 2018/2xxx/CVE-2018-2690.json modified: 2018/2xxx/CVE-2018-2691.json modified: 2018/2xxx/CVE-2018-2692.json modified: 2018/2xxx/CVE-2018-2693.json modified: 2018/2xxx/CVE-2018-2694.json modified: 2018/2xxx/CVE-2018-2695.json modified: 2018/2xxx/CVE-2018-2696.json modified: 2018/2xxx/CVE-2018-2697.json modified: 2018/2xxx/CVE-2018-2698.json modified: 2018/2xxx/CVE-2018-2699.json modified: 2018/2xxx/CVE-2018-2700.json modified: 2018/2xxx/CVE-2018-2701.json modified: 2018/2xxx/CVE-2018-2702.json modified: 2018/2xxx/CVE-2018-2703.json modified: 2018/2xxx/CVE-2018-2704.json modified: 2018/2xxx/CVE-2018-2705.json modified: 2018/2xxx/CVE-2018-2706.json modified: 2018/2xxx/CVE-2018-2707.json modified: 2018/2xxx/CVE-2018-2708.json modified: 2018/2xxx/CVE-2018-2709.json modified: 2018/2xxx/CVE-2018-2710.json modified: 2018/2xxx/CVE-2018-2711.json modified: 2018/2xxx/CVE-2018-2712.json modified: 2018/2xxx/CVE-2018-2713.json modified: 2018/2xxx/CVE-2018-2714.json modified: 2018/2xxx/CVE-2018-2715.json modified: 2018/2xxx/CVE-2018-2716.json modified: 2018/2xxx/CVE-2018-2717.json modified: 2018/2xxx/CVE-2018-2719.json modified: 2018/2xxx/CVE-2018-2720.json modified: 2018/2xxx/CVE-2018-2721.json modified: 2018/2xxx/CVE-2018-2722.json modified: 2018/2xxx/CVE-2018-2723.json modified: 2018/2xxx/CVE-2018-2724.json modified: 2018/2xxx/CVE-2018-2725.json modified: 2018/2xxx/CVE-2018-2726.json modified: 2018/2xxx/CVE-2018-2727.json modified: 2018/2xxx/CVE-2018-2728.json modified: 2018/2xxx/CVE-2018-2729.json modified: 2018/2xxx/CVE-2018-2730.json modified: 2018/2xxx/CVE-2018-2731.json modified: 2018/2xxx/CVE-2018-2732.json modified: 2018/2xxx/CVE-2018-2733.json
2018-01-16 15:22:32 -08:00
}
2018-01-17 21:02:46 -05:00
]
}
},
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description" : {
"description_data" : [
{
"lang" : "eng",
"value" : "The DES and Triple DES ciphers, as used in the TLS, SSH, and IPSec protocols and other protocols and products, have a birthday bound of approximately four billion blocks, which makes it easier for remote attackers to obtain cleartext data via a birthday attack against a long-duration encrypted session, as demonstrated by an HTTPS session using Triple DES in CBC mode, aka a \"Sweet32\" attack."
}
]
},
"problemtype" : {
"problemtype_data" : [
{
"description" : [
{
"lang" : "eng",
"value" : "n/a"
}
]
}
]
},
"references" : {
"reference_data" : [
{
"name" : "[tls] 20091120 RC4+3DES rekeying - long-lived TLS connections",
"refsource" : "MLIST",
2018-01-17 21:02:46 -05:00
"url" : "https://www.ietf.org/mail-archive/web/tls/current/msg04560.html"
},
{
"name" : "https://blog.cryptographyengineering.com/2016/08/24/attack-of-week-64-bit-ciphers-in-tls/",
"refsource" : "MISC",
2018-01-17 21:02:46 -05:00
"url" : "https://blog.cryptographyengineering.com/2016/08/24/attack-of-week-64-bit-ciphers-in-tls/"
},
{
"name" : "https://github.com/ssllabs/ssllabs-scan/issues/387#issuecomment-242514633",
"refsource" : "MISC",
2018-01-17 21:02:46 -05:00
"url" : "https://github.com/ssllabs/ssllabs-scan/issues/387#issuecomment-242514633"
},
{
"name" : "https://nakedsecurity.sophos.com/2016/08/25/anatomy-of-a-cryptographic-collision-the-sweet32-attack/",
"refsource" : "MISC",
2018-01-17 21:02:46 -05:00
"url" : "https://nakedsecurity.sophos.com/2016/08/25/anatomy-of-a-cryptographic-collision-the-sweet32-attack/"
},
{
"name" : "https://sweet32.info/",
"refsource" : "MISC",
2018-01-17 21:02:46 -05:00
"url" : "https://sweet32.info/"
},
{
"name" : "https://www.nccgroup.trust/us/about-us/newsroom-and-events/blog/2016/august/new-practical-attacks-on-64-bit-block-ciphers-3des-blowfish/",
"refsource" : "MISC",
2018-01-17 21:02:46 -05:00
"url" : "https://www.nccgroup.trust/us/about-us/newsroom-and-events/blog/2016/august/new-practical-attacks-on-64-bit-block-ciphers-3des-blowfish/"
},
{
"name" : "https://www.sigsac.org/ccs/CCS2016/accepted-papers/",
"refsource" : "MISC",
2018-01-17 21:02:46 -05:00
"url" : "https://www.sigsac.org/ccs/CCS2016/accepted-papers/"
},
{
"name" : "https://www.teskalabs.com/blog/teskalabs-bulletin-160826-seacat-sweet32-issue",
"refsource" : "MISC",
2018-01-17 21:02:46 -05:00
"url" : "https://www.teskalabs.com/blog/teskalabs-bulletin-160826-seacat-sweet32-issue"
},
2018-03-27 12:06:22 -04:00
{
"name" : "https://ics-cert.us-cert.gov/advisories/ICSMA-18-058-02",
"refsource" : "MISC",
2018-03-27 12:06:22 -04:00
"url" : "https://ics-cert.us-cert.gov/advisories/ICSMA-18-058-02"
},
2018-01-17 21:02:46 -05:00
{
"name" : "https://access.redhat.com/articles/2548661",
"refsource" : "CONFIRM",
2018-01-17 21:02:46 -05:00
"url" : "https://access.redhat.com/articles/2548661"
},
{
"name" : "https://access.redhat.com/security/cve/cve-2016-2183",
"refsource" : "CONFIRM",
2018-01-17 21:02:46 -05:00
"url" : "https://access.redhat.com/security/cve/cve-2016-2183"
},
{
"name" : "https://bugzilla.redhat.com/show_bug.cgi?id=1369383",
"refsource" : "CONFIRM",
2018-01-17 21:02:46 -05:00
"url" : "https://bugzilla.redhat.com/show_bug.cgi?id=1369383"
},
{
"name" : "https://www.openssl.org/blog/blog/2016/08/24/sweet32/",
"refsource" : "CONFIRM",
2018-01-17 21:02:46 -05:00
"url" : "https://www.openssl.org/blog/blog/2016/08/24/sweet32/"
},
{
"name" : "https://nodejs.org/en/blog/vulnerability/september-2016-security-releases/",
"refsource" : "CONFIRM",
2018-01-17 21:02:46 -05:00
"url" : "https://nodejs.org/en/blog/vulnerability/september-2016-security-releases/"
},
{
"name" : "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05302448",
"refsource" : "CONFIRM",
2018-01-17 21:02:46 -05:00
"url" : "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05302448"
},
{
"name" : "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05309984",
"refsource" : "CONFIRM",
2018-01-17 21:02:46 -05:00
"url" : "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05309984"
},
{
"name" : "http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html",
"refsource" : "CONFIRM",
2018-01-17 21:02:46 -05:00
"url" : "http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html"
},
{
"name" : "http://www.oracle.com/technetwork/topics/security/ovmbulletinoct2016-3090547.html",
"refsource" : "CONFIRM",
2018-01-17 21:02:46 -05:00
"url" : "http://www.oracle.com/technetwork/topics/security/ovmbulletinoct2016-3090547.html"
},
{
"name" : "http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2016-3090545.html",
"refsource" : "CONFIRM",
2018-01-17 21:02:46 -05:00
"url" : "http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2016-3090545.html"
},
{
"name" : "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05323116",
"refsource" : "CONFIRM",
2018-01-17 21:02:46 -05:00
"url" : "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05323116"
},
{
"name" : "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05349499",
"refsource" : "CONFIRM",
2018-01-17 21:02:46 -05:00
"url" : "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05349499"
},
{
"name" : "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05356388",
"refsource" : "CONFIRM",
2018-01-17 21:02:46 -05:00
"url" : "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05356388"
},
{
"name" : "http://www.splunk.com/view/SP-CAAAPSV",
"refsource" : "CONFIRM",
2018-01-17 21:02:46 -05:00
"url" : "http://www.splunk.com/view/SP-CAAAPSV"
},
{
"name" : "http://www.splunk.com/view/SP-CAAAPUE",
"refsource" : "CONFIRM",
2018-01-17 21:02:46 -05:00
"url" : "http://www.splunk.com/view/SP-CAAAPUE"
},
{
"name" : "http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10759",
"refsource" : "CONFIRM",
2018-01-17 21:02:46 -05:00
"url" : "http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10759"
},
{
"name" : "https://bto.bluecoat.com/security-advisory/sa133",
"refsource" : "CONFIRM",
2018-01-17 21:02:46 -05:00
"url" : "https://bto.bluecoat.com/security-advisory/sa133"
},
{
"name" : "https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA40312",
"refsource" : "CONFIRM",
2018-01-17 21:02:46 -05:00
"url" : "https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA40312"
},
{
"name" : "https://kc.mcafee.com/corporate/index?page=content&id=SB10171",
"refsource" : "CONFIRM",
2018-01-17 21:02:46 -05:00
"url" : "https://kc.mcafee.com/corporate/index?page=content&id=SB10171"
},
{
"name" : "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05369403",
"refsource" : "CONFIRM",
2018-01-17 21:02:46 -05:00
"url" : "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05369403"
},
{
"name" : "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05369415",
"refsource" : "CONFIRM",
2018-01-17 21:02:46 -05:00
"url" : "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05369415"
},
{
"name" : "http://www-01.ibm.com/support/docview.wss?uid=nas8N1021697",
"refsource" : "CONFIRM",
2018-01-17 21:02:46 -05:00
"url" : "http://www-01.ibm.com/support/docview.wss?uid=nas8N1021697"
},
{
"name" : "http://www-01.ibm.com/support/docview.wss?uid=swg21991482",
"refsource" : "CONFIRM",
2018-01-17 21:02:46 -05:00
"url" : "http://www-01.ibm.com/support/docview.wss?uid=swg21991482"
},
{
"name" : "http://www-01.ibm.com/support/docview.wss?uid=swg21995039",
"refsource" : "CONFIRM",
2018-01-17 21:02:46 -05:00
"url" : "http://www-01.ibm.com/support/docview.wss?uid=swg21995039"
},
{
"name" : "https://www.tenable.com/security/tns-2016-16",
"refsource" : "CONFIRM",
2018-01-17 21:02:46 -05:00
"url" : "https://www.tenable.com/security/tns-2016-16"
},
{
"name" : "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05385680",
"refsource" : "CONFIRM",
2018-01-17 21:02:46 -05:00
"url" : "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05385680"
},
{
"name" : "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722",
"refsource" : "CONFIRM",
2018-01-17 21:02:46 -05:00
"url" : "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722"
},
{
"name" : "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390849",
"refsource" : "CONFIRM",
2018-01-17 21:02:46 -05:00
"url" : "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390849"
},
{
"name" : "https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03725en_us",
"refsource" : "CONFIRM",
2018-01-17 21:02:46 -05:00
"url" : "https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03725en_us"
},
{
"name" : "http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html",
"refsource" : "CONFIRM",
2018-01-17 21:02:46 -05:00
"url" : "http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html"
},
{
"name" : "https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbgn03765en_us",
"refsource" : "CONFIRM",
2018-01-17 21:02:46 -05:00
"url" : "https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbgn03765en_us"
},
{
"name" : "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html",
"refsource" : "CONFIRM",
2018-01-17 21:02:46 -05:00
"url" : "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html"
},
{
"name" : "https://www.tenable.com/security/tns-2016-20",
"refsource" : "CONFIRM",
2018-01-17 21:02:46 -05:00
"url" : "https://www.tenable.com/security/tns-2016-20"
},
{
"name" : "https://www.tenable.com/security/tns-2016-21",
"refsource" : "CONFIRM",
2018-01-17 21:02:46 -05:00
"url" : "https://www.tenable.com/security/tns-2016-21"
},
{
"name" : "https://www.tenable.com/security/tns-2017-09",
"refsource" : "CONFIRM",
2018-01-17 21:02:46 -05:00
"url" : "https://www.tenable.com/security/tns-2017-09"
},
{
"name" : "https://security.netapp.com/advisory/ntap-20160915-0001/",
"refsource" : "CONFIRM",
2018-01-17 21:02:46 -05:00
"url" : "https://security.netapp.com/advisory/ntap-20160915-0001/"
},
{
"name" : "https://security.netapp.com/advisory/ntap-20170119-0001/",
"refsource" : "CONFIRM",
2018-01-17 21:02:46 -05:00
"url" : "https://security.netapp.com/advisory/ntap-20170119-0001/"
},
{
"name" : "http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html",
"refsource" : "CONFIRM",
2018-01-17 21:02:46 -05:00
"url" : "http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html"
},
{
"name" : "GLSA-201612-16",
"refsource" : "GENTOO",
2018-01-17 21:02:46 -05:00
"url" : "https://security.gentoo.org/glsa/201612-16"
},
{
"name" : "GLSA-201701-65",
"refsource" : "GENTOO",
2018-01-17 21:02:46 -05:00
"url" : "https://security.gentoo.org/glsa/201701-65"
},
{
"name" : "GLSA-201707-01",
"refsource" : "GENTOO",
2018-01-17 21:02:46 -05:00
"url" : "https://security.gentoo.org/glsa/201707-01"
},
{
"name" : "RHSA-2017:3113",
"refsource" : "REDHAT",
2018-01-17 21:02:46 -05:00
"url" : "https://access.redhat.com/errata/RHSA-2017:3113"
},
{
"name" : "RHSA-2017:3114",
"refsource" : "REDHAT",
2018-01-17 21:02:46 -05:00
"url" : "https://access.redhat.com/errata/RHSA-2017:3114"
},
{
"name" : "RHSA-2017:3239",
"refsource" : "REDHAT",
2018-01-17 21:02:46 -05:00
"url" : "https://access.redhat.com/errata/RHSA-2017:3239"
},
{
"name" : "RHSA-2017:3240",
"refsource" : "REDHAT",
2018-01-17 21:02:46 -05:00
"url" : "https://access.redhat.com/errata/RHSA-2017:3240"
},
{
"name" : "RHSA-2017:2708",
"refsource" : "REDHAT",
2018-01-17 21:02:46 -05:00
"url" : "https://access.redhat.com/errata/RHSA-2017:2708"
},
{
"name" : "RHSA-2017:2709",
"refsource" : "REDHAT",
2018-01-17 21:02:46 -05:00
"url" : "https://access.redhat.com/errata/RHSA-2017:2709"
},
{
"name" : "RHSA-2017:2710",
"refsource" : "REDHAT",
2018-01-17 21:02:46 -05:00
"url" : "https://access.redhat.com/errata/RHSA-2017:2710"
},
{
"name" : "RHSA-2017:0336",
"refsource" : "REDHAT",
2018-01-17 21:02:46 -05:00
"url" : "http://rhn.redhat.com/errata/RHSA-2017-0336.html"
},
{
"name" : "RHSA-2017:0337",
"refsource" : "REDHAT",
2018-01-17 21:02:46 -05:00
"url" : "http://rhn.redhat.com/errata/RHSA-2017-0337.html"
},
{
"name" : "RHSA-2017:0338",
"refsource" : "REDHAT",
2018-01-17 21:02:46 -05:00
"url" : "http://rhn.redhat.com/errata/RHSA-2017-0338.html"
},
{
"name" : "RHSA-2017:0462",
"refsource" : "REDHAT",
2018-01-17 21:02:46 -05:00
"url" : "http://rhn.redhat.com/errata/RHSA-2017-0462.html"
},
{
"name" : "RHSA-2017:1216",
"refsource" : "REDHAT",
2018-01-17 21:02:46 -05:00
"url" : "https://access.redhat.com/errata/RHSA-2017:1216"
},
{
"name" : "SUSE-SU-2016:2470",
"refsource" : "SUSE",
2018-01-17 21:02:46 -05:00
"url" : "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00013.html"
},
{
"name" : "92630",
"refsource" : "BID",
2018-01-17 21:02:46 -05:00
"url" : "http://www.securityfocus.com/bid/92630"
},
{
"name" : "95568",
"refsource" : "BID",
2018-01-17 21:02:46 -05:00
"url" : "http://www.securityfocus.com/bid/95568"
},
{
"name" : "1036696",
"refsource" : "SECTRACK",
2018-01-17 21:02:46 -05:00
"url" : "http://www.securitytracker.com/id/1036696"
}
]
}
}