CVE-2016-6306
high-risk
Published 2016-09-26
The certificate parser in OpenSSL before 1.0.1u and 1.0.2 before 1.0.2i might allow remote attackers to cause a denial of service (out-of-bounds read) via crafted certificate operations, related to s3_clnt.c and s3_srvr.c.
Do I need to act?
~
8.1% chance of exploitation in next 30 days
EPSS score — moderate exploit probability
-
Not on CISA KEV list
No confirmed active exploitation reported to CISA
?
Patch status unknown
Check vendor advisories for fix availability and mitigation guidance
5
CVSS 5.9/10
Medium
NETWORK
/ HIGH complexity
Affected Products (20)
References (112)
Third Party Advisory
http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10759
Third Party Advisory
http://lists.opensuse.org/opensuse-security-announce/2016-09/msg00023.html
Third Party Advisory
http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00005.html
Third Party Advisory
http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00011.html
Third Party Advisory
http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00029.html
Third Party Advisory
http://lists.opensuse.org/opensuse-security-announce/2017-10/msg00011.html
Third Party Advisory
http://rhn.redhat.com/errata/RHSA-2016-1940.html
Mailing List
http://seclists.org/fulldisclosure/2017/Jul/31
Third Party Advisory
http://www-01.ibm.com/support/docview.wss?uid=swg21995039
Third Party Advisory
http://www.debian.org/security/2016/dsa-3673
Third Party Advisory
http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20170322-01-openssl...
and 92 more references
53
/ 100
high-risk
Severity
18/34 · Moderate
Exploitability
10/34 · Low
Exposure
25/34 · High