Attacker Value
Unknown
(0 users assessed)
Exploitability
Unknown
(0 users assessed)
User Interaction
None
Privileges Required
None
Attack Vector
Network
0

CVE-2016-2107

Disclosure Date: May 05, 2016
Add MITRE ATT&CK tactics and techniques that apply to this CVE.

Description

The AES-NI implementation in OpenSSL before 1.0.1t and 1.0.2 before 1.0.2h does not consider memory allocation during a certain padding check, which allows remote attackers to obtain sensitive cleartext information via a padding-oracle attack against an AES CBC session. NOTE: this vulnerability exists because of an incorrect fix for CVE-2013-0169.

Add Assessment

No one has assessed this topic. Be the first to add your voice to the community.

CVSS V3 Severity and Metrics
Base Score:
5.9 Medium
Impact Score:
3.6
Exploitability Score:
2.2
Vector:
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
Attack Vector (AV):
Network
Attack Complexity (AC):
High
Privileges Required (PR):
None
User Interaction (UI):
None
Scope (S):
Unchanged
Confidentiality (C):
High
Integrity (I):
None
Availability (A):
None

General Information

Vendors

  • canonical,
  • debian,
  • google,
  • hp,
  • nodejs,
  • openssl,
  • opensuse,
  • redhat

Products

  • android 4.0,
  • android 4.0.1,
  • android 4.0.2,
  • android 4.0.3,
  • android 4.0.4,
  • android 4.1,
  • android 4.1.2,
  • android 4.2,
  • android 4.2.1,
  • android 4.2.2,
  • android 4.3,
  • android 4.3.1,
  • android 4.4,
  • android 4.4.1,
  • android 4.4.2,
  • android 4.4.3,
  • android 5.0,
  • android 5.0.1,
  • android 5.1,
  • android 5.1.0,
  • debian linux 8.0,
  • enterprise linux desktop 6.0,
  • enterprise linux desktop 7.0,
  • enterprise linux hpc node 6.0,
  • enterprise linux hpc node 7.0,
  • enterprise linux hpc node eus 7.2,
  • enterprise linux server 6.0,
  • enterprise linux server 7.0,
  • enterprise linux server aus 7.2,
  • enterprise linux server eus 7.2,
  • enterprise linux workstation 6.0,
  • enterprise linux workstation 7.0,
  • helion openstack 2.0.0,
  • helion openstack 2.1.0,
  • helion openstack 2.1.2,
  • helion openstack 2.1.4,
  • leap 42.1,
  • node.js,
  • node.js 6.0.0,
  • openssl,
  • openssl 1.0.2,
  • openssl 1.0.2a,
  • openssl 1.0.2b,
  • openssl 1.0.2c,
  • openssl 1.0.2d,
  • openssl 1.0.2e,
  • openssl 1.0.2f,
  • openssl 1.0.2g,
  • opensuse 13.2,
  • ubuntu linux 12.04,
  • ubuntu linux 14.04,
  • ubuntu linux 15.10,
  • ubuntu linux 16.04

References

Advisory

Additional Info

Technical Analysis