{ "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", "CVE_data_meta": { "ID": "CVE-2016-8610", "ASSIGNER": "secalert@redhat.com", "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", "value": "A denial of service flaw was found in OpenSSL 0.9.8, 1.0.1, 1.0.2 through 1.0.2h, and 1.1.0 in the way the TLS/SSL protocol defined processing of ALERT packets during a connection handshake. A remote attacker could use this flaw to make a TLS/SSL server consume an excessive amount of CPU and fail to accept connections from other clients." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-400", "cweId": "CWE-400" } ] } ] }, "affects": { "vendor": { "vendor_data": [ { "vendor_name": "OpenSSL", "product": { "product_data": [ { "product_name": "OpenSSL", "version": { "version_data": [ { "version_affected": "=", "version_value": "All 0.9.8" }, { "version_affected": "=", "version_value": "All 1.0.1" }, { "version_affected": "=", "version_value": "1.0.2 through 1.0.2h" }, { "version_affected": "=", "version_value": "1.1.0" } ] } } ] } } ] } }, "references": { "reference_data": [ { "url": "https://www.oracle.com/security-alerts/cpuapr2020.html", "refsource": "MISC", "name": "https://www.oracle.com/security-alerts/cpuapr2020.html" }, { "url": "https://www.oracle.com/security-alerts/cpujul2020.html", "refsource": "MISC", "name": "https://www.oracle.com/security-alerts/cpujul2020.html" }, { "url": "https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html", "refsource": "MISC", "name": "https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html" }, { "url": "https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html", "refsource": "MISC", "name": "https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html" }, { "url": "https://www.oracle.com/security-alerts/cpujan2020.html", "refsource": "MISC", "name": "https://www.oracle.com/security-alerts/cpujan2020.html" }, { "url": "https://security.360.cn/cve/CVE-2016-8610/", "refsource": "MISC", "name": "https://security.360.cn/cve/CVE-2016-8610/" }, { "url": "https://www.oracle.com/security-alerts/cpuoct2020.html", "refsource": "MISC", "name": "https://www.oracle.com/security-alerts/cpuoct2020.html" }, { "url": "http://rhn.redhat.com/errata/RHSA-2017-0286.html", "refsource": "MISC", "name": "http://rhn.redhat.com/errata/RHSA-2017-0286.html" }, { "url": "http://rhn.redhat.com/errata/RHSA-2017-0574.html", "refsource": "MISC", "name": "http://rhn.redhat.com/errata/RHSA-2017-0574.html" }, { "url": "http://rhn.redhat.com/errata/RHSA-2017-1415.html", "refsource": "MISC", "name": "http://rhn.redhat.com/errata/RHSA-2017-1415.html" }, { "url": "http://rhn.redhat.com/errata/RHSA-2017-1659.html", "refsource": "MISC", "name": "http://rhn.redhat.com/errata/RHSA-2017-1659.html" }, { "url": "http://seclists.org/oss-sec/2016/q4/224", "refsource": "MISC", "name": "http://seclists.org/oss-sec/2016/q4/224" }, { "url": "http://www.securityfocus.com/bid/93841", "refsource": "MISC", "name": "http://www.securityfocus.com/bid/93841" }, { "url": "http://www.securitytracker.com/id/1037084", "refsource": "MISC", "name": "http://www.securitytracker.com/id/1037084" }, { "url": "https://access.redhat.com/errata/RHSA-2017:1413", "refsource": "MISC", "name": "https://access.redhat.com/errata/RHSA-2017:1413" }, { "url": "https://access.redhat.com/errata/RHSA-2017:1414", "refsource": "MISC", "name": "https://access.redhat.com/errata/RHSA-2017:1414" }, { "url": "https://access.redhat.com/errata/RHSA-2017:1658", "refsource": "MISC", "name": "https://access.redhat.com/errata/RHSA-2017:1658" }, { "url": "https://access.redhat.com/errata/RHSA-2017:1801", "refsource": "MISC", "name": "https://access.redhat.com/errata/RHSA-2017:1801" }, { "url": "https://access.redhat.com/errata/RHSA-2017:1802", "refsource": "MISC", "name": "https://access.redhat.com/errata/RHSA-2017:1802" }, { "url": "https://access.redhat.com/errata/RHSA-2017:2493", "refsource": "MISC", "name": "https://access.redhat.com/errata/RHSA-2017:2493" }, { "url": "https://access.redhat.com/errata/RHSA-2017:2494", "refsource": "MISC", "name": "https://access.redhat.com/errata/RHSA-2017:2494" }, { "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-8610", "refsource": "MISC", "name": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-8610" }, { "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commit%3Bh=af58be768ebb690f78530f796e92b8ae5c9a4401", "refsource": "MISC", "name": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commit%3Bh=af58be768ebb690f78530f796e92b8ae5c9a4401" }, { "url": "https://security.FreeBSD.org/advisories/FreeBSD-SA-16:35.openssl.asc", "refsource": "MISC", "name": "https://security.FreeBSD.org/advisories/FreeBSD-SA-16:35.openssl.asc" }, { "url": "https://security.netapp.com/advisory/ntap-20171130-0001/", "refsource": "MISC", "name": "https://security.netapp.com/advisory/ntap-20171130-0001/" }, { "url": "https://security.paloaltonetworks.com/CVE-2016-8610", "refsource": "MISC", "name": "https://security.paloaltonetworks.com/CVE-2016-8610" }, { "url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03897en_us", "refsource": "MISC", "name": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03897en_us" }, { "url": "https://www.debian.org/security/2017/dsa-3773", "refsource": "MISC", "name": "https://www.debian.org/security/2017/dsa-3773" } ] } }