The AES-NI implementation in OpenSSL before 1.0.1t and 1.0.2 before 1.0.2h does not consider memory allocation during a certain padding check, which allows remote attackers to obtain sensitive cleartext information via a padding-oracle attack against an AES CBC session. NOTE: this vulnerability exists because of an incorrect fix for CVE-2013-0169.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
Configuration 4 (hide)
|
Configuration 5 (hide)
|
Configuration 6 (hide)
|
Configuration 7 (hide)
|
Configuration 8 (hide)
|
Configuration 9 (hide)
|
History
No history.
Information
Published : 2016-05-05 01:59
Updated : 2024-02-16 19:19
NVD link : CVE-2016-2107
Mitre link : CVE-2016-2107
CVE.ORG link : CVE-2016-2107
JSON object : View
Products Affected
hp
- helion_openstack
redhat
- enterprise_linux_server
- enterprise_linux_hpc_node
- enterprise_linux_hpc_node_eus
- enterprise_linux_server_aus
- enterprise_linux_desktop
- enterprise_linux_server_eus
- enterprise_linux_workstation
opensuse
- opensuse
- leap
- android
nodejs
- node.js
canonical
- ubuntu_linux
debian
- debian_linux
openssl
- openssl