The AES-NI implementation in OpenSSL before 1.0.1t and 1.0.2 before 1.0.2h does not consider memory allocation during a certain padding check, which allows remote attackers to obtain sensitive cleartext information via a padding-oracle attack against an AES CBC session. NOTE: this vulnerability exists because of an incorrect fix for CVE-2013-0169.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
Configuration 4 (hide)
|
Configuration 5 (hide)
|
Configuration 6 (hide)
|
Configuration 7 (hide)
|
Configuration 8 (hide)
|
Configuration 9 (hide)
|
Information
Published : 2016-05-04 18:59
Updated : 2022-12-13 04:15
NVD link : CVE-2016-2107
Mitre link : CVE-2016-2107
JSON object : View
Products Affected
redhat
- enterprise_linux_desktop
- enterprise_linux_hpc_node
- enterprise_linux_server_aus
- enterprise_linux_workstation
- enterprise_linux_server_eus
- enterprise_linux_hpc_node_eus
- enterprise_linux_server
- android
hp
- helion_openstack
nodejs
- node.js
openssl
- openssl
canonical
- ubuntu_linux
opensuse
- leap
- opensuse
debian
- debian_linux