CVE-2016-2180
high-risk
Published 2016-08-01
The TS_OBJ_print_bio function in crypto/ts/ts_lib.c in the X.509 Public Key Infrastructure Time-Stamp Protocol (TSP) implementation in OpenSSL through 1.0.2h allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via a crafted time-stamp file that is mishandled by the "openssl ts" command.
Do I need to act?
~
4.2% chance of exploitation in next 30 days
EPSS score — moderate exploit probability
-
Not on CISA KEV list
No confirmed active exploitation reported to CISA
?
Patch status unknown
Check vendor advisories for fix availability and mitigation guidance
7
CVSS 7.5/10
High
NETWORK
/ LOW complexity
Affected Products (20)
References (50)
Third Party Advisory
http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10759
Third Party Advisory
http://www-01.ibm.com/support/docview.wss?uid=swg21995039
Third Party Advisory
http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html
Third Party Advisory
http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2016-3090545.h...
Third Party Advisory
http://www.oracle.com/technetwork/topics/security/ovmbulletinoct2016-3090547.htm...
Third Party Advisory
http://www.securityfocus.com/bid/92117
Third Party Advisory
http://www.splunk.com/view/SP-CAAAPSV
Third Party Advisory
http://www.splunk.com/view/SP-CAAAPUE
Third Party Advisory
https://bto.bluecoat.com/security-advisory/sa132
Issue Tracking
https://bugzilla.redhat.com/show_bug.cgi?id=1359615
Third Party Advisory
https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA40312
and 30 more references
56
/ 100
high-risk
Severity
26/34 · High
Exploitability
7/34 · Low
Exposure
23/34 · High