CVE-2016-0797
high-risk
Published 2016-03-03
Multiple integer overflows in OpenSSL 1.0.1 before 1.0.1s and 1.0.2 before 1.0.2g allow remote attackers to cause a denial of service (heap memory corruption or NULL pointer dereference) or possibly have unspecified other impact via a long digit string that is mishandled by the (1) BN_dec2bn or (2) BN_hex2bn function, related to crypto/bn/bn.h and crypto/bn/bn_print.c.
Do I need to act?
!
34.2% chance of exploitation in next 30 days
EPSS score — higher than 66% of all CVEs
-
Not on CISA KEV list
No confirmed active exploitation reported to CISA
?
Patch status unknown
Check vendor advisories for fix availability and mitigation guidance
7
CVSS 7.5/10
High
NETWORK
/ LOW complexity
Affected Products (20)
References (88)
Third Party Advisory
http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10759
Mailing List
http://marc.info/?l=bugtraq&m=145889460330120&w=2
Vendor Advisory
http://openssl.org/news/secadv/20160301.txt
and 68 more references
66
/ 100
high-risk
Severity
26/34 · High
Exploitability
16/34 · Moderate
Exposure
24/34 · High