Show plain JSON{"id": "CVE-2016-2176", "cveTags": [], "metrics": {"cvssMetricV2": [{"type": "Primary", "source": "nvd@nist.gov", "cvssData": {"version": "2.0", "baseScore": 6.4, "accessVector": "NETWORK", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:P", "authentication": "NONE", "integrityImpact": "NONE", "accessComplexity": "LOW", "availabilityImpact": "PARTIAL", "confidentialityImpact": "PARTIAL"}, "acInsufInfo": false, "impactScore": 4.9, "baseSeverity": "MEDIUM", "obtainAllPrivilege": false, "exploitabilityScore": 10.0, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": false}], "cvssMetricV30": [{"type": "Primary", "source": "nvd@nist.gov", "cvssData": {"scope": "UNCHANGED", "version": "3.0", "baseScore": 8.2, "attackVector": "NETWORK", "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H", "integrityImpact": "NONE", "userInteraction": "NONE", "attackComplexity": "LOW", "availabilityImpact": "HIGH", "privilegesRequired": "NONE", "confidentialityImpact": "LOW"}, "impactScore": 4.2, "exploitabilityScore": 3.9}]}, "published": "2016-05-05T01:59:06.340", "references": [{"url": "http://lists.apple.com/archives/security-announce/2016/Jul/msg00000.html", "source": "secalert@redhat.com"}, {"url": "http://packetstormsecurity.com/files/136912/Slackware-Security-Advisory-openssl-Updates.html", "source": "secalert@redhat.com"}, {"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160504-openssl", "source": "secalert@redhat.com"}, {"url": "http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html", "source": "secalert@redhat.com"}, {"url": "http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html", "source": "secalert@redhat.com"}, {"url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html", "source": "secalert@redhat.com"}, {"url": "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html", "source": "secalert@redhat.com"}, {"url": "http://www.securityfocus.com/bid/89746", "source": "secalert@redhat.com"}, {"url": "http://www.securityfocus.com/bid/91787", "source": "secalert@redhat.com"}, {"url": "http://www.securitytracker.com/id/1035721", "source": "secalert@redhat.com"}, {"url": "http://www.slackware.com/security/viewer.php?l=slackware-security&y=2016&m=slackware-security.542103", "source": "secalert@redhat.com"}, {"url": "https://bto.bluecoat.com/security-advisory/sa123", "source": "secalert@redhat.com"}, {"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-412672.pdf", "source": "secalert@redhat.com"}, {"url": "https://git.openssl.org/?p=openssl.git%3Ba=commit%3Bh=2919516136a4227d9e6d8f2fe66ef976aaf8c561", "source": "secalert@redhat.com"}, {"url": "https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03756en_us", "source": "secalert@redhat.com"}, {"url": "https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03765en_us", "source": "secalert@redhat.com"}, {"url": "https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA40202", "source": "secalert@redhat.com"}, {"url": "https://kc.mcafee.com/corporate/index?page=content&id=SB10160", "source": "secalert@redhat.com"}, {"url": "https://security.gentoo.org/glsa/201612-16", "source": "secalert@redhat.com"}, {"url": "https://security.netapp.com/advisory/ntap-20160504-0001/", "source": "secalert@redhat.com"}, {"url": "https://support.apple.com/HT206903", "source": "secalert@redhat.com"}, {"url": "https://www.openssl.org/news/secadv/20160503.txt", "tags": ["Vendor Advisory"], "source": "secalert@redhat.com"}, {"url": "https://www.tenable.com/security/tns-2016-18", "source": "secalert@redhat.com"}, {"url": "http://lists.apple.com/archives/security-announce/2016/Jul/msg00000.html", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://packetstormsecurity.com/files/136912/Slackware-Security-Advisory-openssl-Updates.html", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160504-openssl", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://www.securityfocus.com/bid/89746", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://www.securityfocus.com/bid/91787", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://www.securitytracker.com/id/1035721", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://www.slackware.com/security/viewer.php?l=slackware-security&y=2016&m=slackware-security.542103", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "https://bto.bluecoat.com/security-advisory/sa123", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-412672.pdf", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "https://git.openssl.org/?p=openssl.git%3Ba=commit%3Bh=2919516136a4227d9e6d8f2fe66ef976aaf8c561", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03756en_us", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03765en_us", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA40202", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "https://kc.mcafee.com/corporate/index?page=content&id=SB10160", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "https://security.gentoo.org/glsa/201612-16", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "https://security.netapp.com/advisory/ntap-20160504-0001/", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "https://support.apple.com/HT206903", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "https://www.openssl.org/news/secadv/20160503.txt", "tags": ["Vendor Advisory"], "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "https://www.tenable.com/security/tns-2016-18", "source": "af854a3a-2127-422b-91ae-364da2661108"}], "vulnStatus": "Deferred", "weaknesses": [{"type": "Primary", "source": "nvd@nist.gov", "description": [{"lang": "en", "value": "CWE-119"}]}], "descriptions": [{"lang": "en", "value": "The X509_NAME_oneline function in crypto/x509/x509_obj.c in OpenSSL before 1.0.1t and 1.0.2 before 1.0.2h allows remote attackers to obtain sensitive information from process stack memory or cause a denial of service (buffer over-read) via crafted EBCDIC ASN.1 data."}, {"lang": "es", "value": "La funci\u00f3n X509_NAME_oneline en crypto/x509/x509_obj.c en OpenSSL en versiones anteriores a 1.0.1t y 1.0.2 en versiones anteriores a 1.0.2h permite a atacantes remotos obtener informaci\u00f3n sensible de la pila de memoria de proceso o provocar una denegaci\u00f3n de servicio (sobrelectura de buffer) a trav\u00e9s de datos EBCDIC ASN.1 manipulados."}], "lastModified": "2025-04-12T10:46:40.837", "configurations": [{"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:a:openssl:openssl:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C1F608A0-78BE-4F17-9E41-70933E52B3C7", "versionEndIncluding": "1.0.1s"}, {"criteria": "cpe:2.3:a:openssl:openssl:1.0.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "AD3E5C1B-EC63-4214-A0BD-0B8681CE6C8B"}, {"criteria": "cpe:2.3:a:openssl:openssl:1.0.2:beta1:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "18797BEE-417D-4959-9AAD-C5A7C051B524"}, {"criteria": "cpe:2.3:a:openssl:openssl:1.0.2:beta2:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "6FAA3C31-BD9D-45A9-A502-837FECA6D479"}, {"criteria": "cpe:2.3:a:openssl:openssl:1.0.2:beta3:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "6455A421-9956-4846-AC7C-3431E0D37D23"}, {"criteria": "cpe:2.3:a:openssl:openssl:1.0.2a:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "60F946FD-F564-49DA-B043-5943308BA9EE"}, {"criteria": "cpe:2.3:a:openssl:openssl:1.0.2b:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "4847BCF3-EFCE-41AF-8E7D-3D51EB9DCC5B"}, {"criteria": "cpe:2.3:a:openssl:openssl:1.0.2c:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "9B89180B-FB68-4DD8-B076-16E51CC7FB91"}, {"criteria": "cpe:2.3:a:openssl:openssl:1.0.2d:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "4C986592-4086-4A39-9767-EF34DBAA6A53"}, {"criteria": "cpe:2.3:a:openssl:openssl:1.0.2e:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "7B23181C-03DB-4E92-B3F6-6B585B5231B4"}, {"criteria": "cpe:2.3:a:openssl:openssl:1.0.2f:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "94D9EC1C-4843-4026-9B05-E060E9391734"}, {"criteria": "cpe:2.3:a:openssl:openssl:1.0.2g:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "B066401C-21CF-4BE9-9C55-C9F1E0C7BE3F"}], "operator": "OR"}]}], "sourceIdentifier": "secalert@redhat.com"}