The AES-NI implementation in OpenSSL before 1.0.1t and 1.0.2 before 1.0.2h does not consider memory allocation during a certain padding check, which allows remote attackers to obtain sensitive cleartext information via a padding-oracle attack against an AES CBC session. NOTE: this vulnerability exists because of an incorrect fix for CVE-2013-0169.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
Configuration 4 (hide)
|
Configuration 5 (hide)
|
Configuration 6 (hide)
|
Information
Published : 2016-05-05 01:59
Updated : 2018-10-30 16:27
NVD link : CVE-2016-2107
Mitre link : CVE-2016-2107
JSON object : View
Products Affected
redhat
- enterprise_linux_server
- enterprise_linux_server_eus
- enterprise_linux_server_aus
- enterprise_linux_hpc_node
- enterprise_linux_desktop
- enterprise_linux_workstation
- enterprise_linux_hpc_node_eus
opensuse
- leap
- opensuse
openssl
- openssl
- android
hp
- helion_openstack
