ID CVE-2016-0705
Summary Double free vulnerability in the dsa_priv_decode function in crypto/dsa/dsa_ameth.c in OpenSSL 1.0.1 before 1.0.1s and 1.0.2 before 1.0.2g allows remote attackers to cause a denial of service (memory corruption) or possibly have unspecified other impact via a malformed DSA private key.
References
Vulnerable Configurations
  • cpe:2.3:a:oracle:mysql:5.6.0:*:*:*:*:*:*:*
    cpe:2.3:a:oracle:mysql:5.6.0:*:*:*:*:*:*:*
  • cpe:2.3:a:oracle:mysql:5.6.0:*:*:*:enterprise:*:*:*
    cpe:2.3:a:oracle:mysql:5.6.0:*:*:*:enterprise:*:*:*
  • cpe:2.3:a:oracle:mysql:5.6.1:*:*:*:*:*:*:*
    cpe:2.3:a:oracle:mysql:5.6.1:*:*:*:*:*:*:*
  • cpe:2.3:a:oracle:mysql:5.6.2:*:*:*:*:*:*:*
    cpe:2.3:a:oracle:mysql:5.6.2:*:*:*:*:*:*:*
  • cpe:2.3:a:oracle:mysql:5.6.3:*:*:*:*:*:*:*
    cpe:2.3:a:oracle:mysql:5.6.3:*:*:*:*:*:*:*
  • cpe:2.3:a:oracle:mysql:5.6.4:*:*:*:*:*:*:*
    cpe:2.3:a:oracle:mysql:5.6.4:*:*:*:*:*:*:*
  • cpe:2.3:a:oracle:mysql:5.6.5:*:*:*:*:*:*:*
    cpe:2.3:a:oracle:mysql:5.6.5:*:*:*:*:*:*:*
  • cpe:2.3:a:oracle:mysql:5.6.6:*:*:*:*:*:*:*
    cpe:2.3:a:oracle:mysql:5.6.6:*:*:*:*:*:*:*
  • cpe:2.3:a:oracle:mysql:5.6.7:*:*:*:*:*:*:*
    cpe:2.3:a:oracle:mysql:5.6.7:*:*:*:*:*:*:*
  • cpe:2.3:a:oracle:mysql:5.6.8:*:*:*:*:*:*:*
    cpe:2.3:a:oracle:mysql:5.6.8:*:*:*:*:*:*:*
  • cpe:2.3:a:oracle:mysql:5.6.9:*:*:*:*:*:*:*
    cpe:2.3:a:oracle:mysql:5.6.9:*:*:*:*:*:*:*
  • cpe:2.3:a:oracle:mysql:5.6.10:*:*:*:*:*:*:*
    cpe:2.3:a:oracle:mysql:5.6.10:*:*:*:*:*:*:*
  • cpe:2.3:a:oracle:mysql:5.6.11:*:*:*:*:*:*:*
    cpe:2.3:a:oracle:mysql:5.6.11:*:*:*:*:*:*:*
  • cpe:2.3:a:oracle:mysql:5.6.12:*:*:*:*:*:*:*
    cpe:2.3:a:oracle:mysql:5.6.12:*:*:*:*:*:*:*
  • cpe:2.3:a:oracle:mysql:5.6.13:*:*:*:*:*:*:*
    cpe:2.3:a:oracle:mysql:5.6.13:*:*:*:*:*:*:*
  • cpe:2.3:a:oracle:mysql:5.6.14:*:*:*:*:*:*:*
    cpe:2.3:a:oracle:mysql:5.6.14:*:*:*:*:*:*:*
  • cpe:2.3:a:oracle:mysql:5.6.15:*:*:*:*:*:*:*
    cpe:2.3:a:oracle:mysql:5.6.15:*:*:*:*:*:*:*
  • cpe:2.3:a:oracle:mysql:5.6.16:*:*:*:*:*:*:*
    cpe:2.3:a:oracle:mysql:5.6.16:*:*:*:*:*:*:*
  • cpe:2.3:a:oracle:mysql:5.6.17:*:*:*:*:*:*:*
    cpe:2.3:a:oracle:mysql:5.6.17:*:*:*:*:*:*:*
  • cpe:2.3:a:oracle:mysql:5.6.18:*:*:*:*:*:*:*
    cpe:2.3:a:oracle:mysql:5.6.18:*:*:*:*:*:*:*
  • cpe:2.3:a:oracle:mysql:5.6.19:*:*:*:*:*:*:*
    cpe:2.3:a:oracle:mysql:5.6.19:*:*:*:*:*:*:*
  • cpe:2.3:a:oracle:mysql:5.6.20:*:*:*:*:*:*:*
    cpe:2.3:a:oracle:mysql:5.6.20:*:*:*:*:*:*:*
  • cpe:2.3:a:oracle:mysql:5.6.21:*:*:*:*:*:*:*
    cpe:2.3:a:oracle:mysql:5.6.21:*:*:*:*:*:*:*
  • cpe:2.3:a:oracle:mysql:5.6.22:*:*:*:*:*:*:*
    cpe:2.3:a:oracle:mysql:5.6.22:*:*:*:*:*:*:*
  • cpe:2.3:a:oracle:mysql:5.6.23:*:*:*:*:*:*:*
    cpe:2.3:a:oracle:mysql:5.6.23:*:*:*:*:*:*:*
  • cpe:2.3:a:oracle:mysql:5.6.24:*:*:*:*:*:*:*
    cpe:2.3:a:oracle:mysql:5.6.24:*:*:*:*:*:*:*
  • cpe:2.3:a:oracle:mysql:5.6.25:*:*:*:*:*:*:*
    cpe:2.3:a:oracle:mysql:5.6.25:*:*:*:*:*:*:*
  • cpe:2.3:a:oracle:mysql:5.6.26:*:*:*:*:*:*:*
    cpe:2.3:a:oracle:mysql:5.6.26:*:*:*:*:*:*:*
  • cpe:2.3:a:oracle:mysql:5.6.27:*:*:*:*:*:*:*
    cpe:2.3:a:oracle:mysql:5.6.27:*:*:*:*:*:*:*
  • cpe:2.3:a:oracle:mysql:5.6.28:*:*:*:*:*:*:*
    cpe:2.3:a:oracle:mysql:5.6.28:*:*:*:*:*:*:*
  • cpe:2.3:a:oracle:mysql:5.6.29:*:*:*:*:*:*:*
    cpe:2.3:a:oracle:mysql:5.6.29:*:*:*:*:*:*:*
  • cpe:2.3:a:oracle:mysql:5.7.0:*:*:*:*:*:*:*
    cpe:2.3:a:oracle:mysql:5.7.0:*:*:*:*:*:*:*
  • cpe:2.3:a:oracle:mysql:5.7.0:*:*:*:-:*:*:*
    cpe:2.3:a:oracle:mysql:5.7.0:*:*:*:-:*:*:*
  • cpe:2.3:a:oracle:mysql:5.7.0:*:*:*:community:*:*:*
    cpe:2.3:a:oracle:mysql:5.7.0:*:*:*:community:*:*:*
  • cpe:2.3:a:oracle:mysql:5.7.0:*:*:*:enterprise:*:*:*
    cpe:2.3:a:oracle:mysql:5.7.0:*:*:*:enterprise:*:*:*
  • cpe:2.3:a:oracle:mysql:5.7.1:*:*:*:*:*:*:*
    cpe:2.3:a:oracle:mysql:5.7.1:*:*:*:*:*:*:*
  • cpe:2.3:a:oracle:mysql:5.7.2:*:*:*:*:*:*:*
    cpe:2.3:a:oracle:mysql:5.7.2:*:*:*:*:*:*:*
  • cpe:2.3:a:oracle:mysql:5.7.3:*:*:*:*:*:*:*
    cpe:2.3:a:oracle:mysql:5.7.3:*:*:*:*:*:*:*
  • cpe:2.3:a:oracle:mysql:5.7.4:*:*:*:*:*:*:*
    cpe:2.3:a:oracle:mysql:5.7.4:*:*:*:*:*:*:*
  • cpe:2.3:a:oracle:mysql:5.7.5:*:*:*:*:*:*:*
    cpe:2.3:a:oracle:mysql:5.7.5:*:*:*:*:*:*:*
  • cpe:2.3:a:oracle:mysql:5.7.6:*:*:*:*:*:*:*
    cpe:2.3:a:oracle:mysql:5.7.6:*:*:*:*:*:*:*
  • cpe:2.3:a:oracle:mysql:5.7.7:*:*:*:*:*:*:*
    cpe:2.3:a:oracle:mysql:5.7.7:*:*:*:*:*:*:*
  • cpe:2.3:a:oracle:mysql:5.7.8:*:*:*:*:*:*:*
    cpe:2.3:a:oracle:mysql:5.7.8:*:*:*:*:*:*:*
  • cpe:2.3:a:oracle:mysql:5.7.9:*:*:*:*:*:*:*
    cpe:2.3:a:oracle:mysql:5.7.9:*:*:*:*:*:*:*
  • cpe:2.3:a:oracle:mysql:5.7.10:*:*:*:*:*:*:*
    cpe:2.3:a:oracle:mysql:5.7.10:*:*:*:*:*:*:*
  • cpe:2.3:a:oracle:mysql:5.7.11:*:*:*:*:*:*:*
    cpe:2.3:a:oracle:mysql:5.7.11:*:*:*:*:*:*:*
  • cpe:2.3:a:openssl:openssl:1.0.1m:*:*:*:*:*:*:*
    cpe:2.3:a:openssl:openssl:1.0.1m:*:*:*:*:*:*:*
  • cpe:2.3:a:openssl:openssl:1.0.2a:*:*:*:*:*:*:*
    cpe:2.3:a:openssl:openssl:1.0.2a:*:*:*:*:*:*:*
  • cpe:2.3:a:openssl:openssl:1.0.1j:*:*:*:*:*:*:*
    cpe:2.3:a:openssl:openssl:1.0.1j:*:*:*:*:*:*:*
  • cpe:2.3:a:openssl:openssl:1.0.1:beta2:*:*:*:*:*:*
    cpe:2.3:a:openssl:openssl:1.0.1:beta2:*:*:*:*:*:*
  • cpe:2.3:a:openssl:openssl:1.0.1h:*:*:*:*:*:*:*
    cpe:2.3:a:openssl:openssl:1.0.1h:*:*:*:*:*:*:*
  • cpe:2.3:a:openssl:openssl:1.0.2e:*:*:*:*:*:*:*
    cpe:2.3:a:openssl:openssl:1.0.2e:*:*:*:*:*:*:*
  • cpe:2.3:a:openssl:openssl:1.0.1r:*:*:*:*:*:*:*
    cpe:2.3:a:openssl:openssl:1.0.1r:*:*:*:*:*:*:*
  • cpe:2.3:a:openssl:openssl:1.0.2b:*:*:*:*:*:*:*
    cpe:2.3:a:openssl:openssl:1.0.2b:*:*:*:*:*:*:*
  • cpe:2.3:a:openssl:openssl:1.0.1c:*:*:*:*:*:*:*
    cpe:2.3:a:openssl:openssl:1.0.1c:*:*:*:*:*:*:*
  • cpe:2.3:a:openssl:openssl:1.0.1g:*:*:*:*:*:*:*
    cpe:2.3:a:openssl:openssl:1.0.1g:*:*:*:*:*:*:*
  • cpe:2.3:a:openssl:openssl:1.0.1:beta3:*:*:*:*:*:*
    cpe:2.3:a:openssl:openssl:1.0.1:beta3:*:*:*:*:*:*
  • cpe:2.3:a:openssl:openssl:1.0.1a:*:*:*:*:*:*:*
    cpe:2.3:a:openssl:openssl:1.0.1a:*:*:*:*:*:*:*
  • cpe:2.3:a:openssl:openssl:1.0.1:beta1:*:*:*:*:*:*
    cpe:2.3:a:openssl:openssl:1.0.1:beta1:*:*:*:*:*:*
  • cpe:2.3:a:openssl:openssl:1.0.1d:*:*:*:*:*:*:*
    cpe:2.3:a:openssl:openssl:1.0.1d:*:*:*:*:*:*:*
  • cpe:2.3:a:openssl:openssl:1.0.2c:*:*:*:*:*:*:*
    cpe:2.3:a:openssl:openssl:1.0.2c:*:*:*:*:*:*:*
  • cpe:2.3:a:openssl:openssl:1.0.2:beta3:*:*:*:*:*:*
    cpe:2.3:a:openssl:openssl:1.0.2:beta3:*:*:*:*:*:*
  • cpe:2.3:a:openssl:openssl:1.0.1p:*:*:*:*:*:*:*
    cpe:2.3:a:openssl:openssl:1.0.1p:*:*:*:*:*:*:*
  • cpe:2.3:a:openssl:openssl:1.0.2:beta1:*:*:*:*:*:*
    cpe:2.3:a:openssl:openssl:1.0.2:beta1:*:*:*:*:*:*
  • cpe:2.3:a:openssl:openssl:1.0.1k:*:*:*:*:*:*:*
    cpe:2.3:a:openssl:openssl:1.0.1k:*:*:*:*:*:*:*
  • cpe:2.3:a:openssl:openssl:1.0.1b:*:*:*:*:*:*:*
    cpe:2.3:a:openssl:openssl:1.0.1b:*:*:*:*:*:*:*
  • cpe:2.3:a:openssl:openssl:1.0.1n:*:*:*:*:*:*:*
    cpe:2.3:a:openssl:openssl:1.0.1n:*:*:*:*:*:*:*
  • cpe:2.3:a:openssl:openssl:1.0.1q:*:*:*:*:*:*:*
    cpe:2.3:a:openssl:openssl:1.0.1q:*:*:*:*:*:*:*
  • cpe:2.3:a:openssl:openssl:1.0.1e:*:*:*:*:*:*:*
    cpe:2.3:a:openssl:openssl:1.0.1e:*:*:*:*:*:*:*
  • cpe:2.3:a:openssl:openssl:1.0.1l:*:*:*:*:*:*:*
    cpe:2.3:a:openssl:openssl:1.0.1l:*:*:*:*:*:*:*
  • cpe:2.3:a:openssl:openssl:1.0.1f:*:*:*:*:*:*:*
    cpe:2.3:a:openssl:openssl:1.0.1f:*:*:*:*:*:*:*
  • cpe:2.3:a:openssl:openssl:1.0.1o:*:*:*:*:*:*:*
    cpe:2.3:a:openssl:openssl:1.0.1o:*:*:*:*:*:*:*
  • cpe:2.3:a:openssl:openssl:1.0.2:*:*:*:*:*:*:*
    cpe:2.3:a:openssl:openssl:1.0.2:*:*:*:*:*:*:*
  • cpe:2.3:a:openssl:openssl:1.0.2f:*:*:*:*:*:*:*
    cpe:2.3:a:openssl:openssl:1.0.2f:*:*:*:*:*:*:*
  • cpe:2.3:a:openssl:openssl:1.0.1i:*:*:*:*:*:*:*
    cpe:2.3:a:openssl:openssl:1.0.1i:*:*:*:*:*:*:*
  • cpe:2.3:a:openssl:openssl:1.0.2:beta2:*:*:*:*:*:*
    cpe:2.3:a:openssl:openssl:1.0.2:beta2:*:*:*:*:*:*
  • cpe:2.3:a:openssl:openssl:1.0.1:*:*:*:*:*:*:*
    cpe:2.3:a:openssl:openssl:1.0.1:*:*:*:*:*:*:*
  • cpe:2.3:a:openssl:openssl:1.0.2d:*:*:*:*:*:*:*
    cpe:2.3:a:openssl:openssl:1.0.2d:*:*:*:*:*:*:*
  • cpe:2.3:o:google:android:5.1.0:*:*:*:*:*:*:*
    cpe:2.3:o:google:android:5.1.0:*:*:*:*:*:*:*
  • cpe:2.3:o:google:android:4.2:*:*:*:*:*:*:*
    cpe:2.3:o:google:android:4.2:*:*:*:*:*:*:*
  • cpe:2.3:o:google:android:4.1:*:*:*:*:*:*:*
    cpe:2.3:o:google:android:4.1:*:*:*:*:*:*:*
  • cpe:2.3:o:google:android:6.0.1:*:*:*:*:*:*:*
    cpe:2.3:o:google:android:6.0.1:*:*:*:*:*:*:*
  • cpe:2.3:o:google:android:6.0:*:*:*:*:*:*:*
    cpe:2.3:o:google:android:6.0:*:*:*:*:*:*:*
  • cpe:2.3:o:google:android:4.0.2:*:*:*:*:*:*:*
    cpe:2.3:o:google:android:4.0.2:*:*:*:*:*:*:*
  • cpe:2.3:o:google:android:4.4.3:*:*:*:*:*:*:*
    cpe:2.3:o:google:android:4.4.3:*:*:*:*:*:*:*
  • cpe:2.3:o:google:android:4.0.4:*:*:*:*:*:*:*
    cpe:2.3:o:google:android:4.0.4:*:*:*:*:*:*:*
  • cpe:2.3:o:google:android:4.3:*:*:*:*:*:*:*
    cpe:2.3:o:google:android:4.3:*:*:*:*:*:*:*
  • cpe:2.3:o:google:android:4.0.1:*:*:*:*:*:*:*
    cpe:2.3:o:google:android:4.0.1:*:*:*:*:*:*:*
  • cpe:2.3:o:google:android:4.2.1:*:*:*:*:*:*:*
    cpe:2.3:o:google:android:4.2.1:*:*:*:*:*:*:*
  • cpe:2.3:o:google:android:5.0.1:*:*:*:*:*:*:*
    cpe:2.3:o:google:android:5.0.1:*:*:*:*:*:*:*
  • cpe:2.3:o:google:android:5.0:*:*:*:*:*:*:*
    cpe:2.3:o:google:android:5.0:*:*:*:*:*:*:*
  • cpe:2.3:o:google:android:4.0.3:*:*:*:*:*:*:*
    cpe:2.3:o:google:android:4.0.3:*:*:*:*:*:*:*
  • cpe:2.3:o:google:android:4.0:*:*:*:*:*:*:*
    cpe:2.3:o:google:android:4.0:*:*:*:*:*:*:*
  • cpe:2.3:o:google:android:4.4:*:*:*:*:*:*:*
    cpe:2.3:o:google:android:4.4:*:*:*:*:*:*:*
  • cpe:2.3:o:google:android:4.4.1:*:*:*:*:*:*:*
    cpe:2.3:o:google:android:4.4.1:*:*:*:*:*:*:*
  • cpe:2.3:o:google:android:4.2.2:*:*:*:*:*:*:*
    cpe:2.3:o:google:android:4.2.2:*:*:*:*:*:*:*
  • cpe:2.3:o:google:android:4.3.1:*:*:*:*:*:*:*
    cpe:2.3:o:google:android:4.3.1:*:*:*:*:*:*:*
  • cpe:2.3:o:google:android:4.4.2:*:*:*:*:*:*:*
    cpe:2.3:o:google:android:4.4.2:*:*:*:*:*:*:*
  • cpe:2.3:o:google:android:5.1:*:*:*:*:*:*:*
    cpe:2.3:o:google:android:5.1:*:*:*:*:*:*:*
  • cpe:2.3:o:google:android:4.1.2:*:*:*:*:*:*:*
    cpe:2.3:o:google:android:4.1.2:*:*:*:*:*:*:*
  • cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*
    cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*
  • cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
    cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
  • cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
    cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
  • cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
    cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
  • cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
    cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
CVSS
Base: 10.0 (as of 13-12-2022 - 12:15)
Impact:
Exploitability:
CWE NVD-CWE-Other
CAPEC
Access
VectorComplexityAuthentication
NETWORK LOW NONE
Impact
ConfidentialityIntegrityAvailability
COMPLETE COMPLETE COMPLETE
cvss-vector via4 AV:N/AC:L/Au:N/C:C/I:C/A:C
redhat via4
advisories
  • rhsa
    id RHSA-2016:2957
  • rhsa
    id RHSA-2018:2568
  • rhsa
    id RHSA-2018:2575
  • rhsa
    id RHSA-2018:2713
rpms
  • openssl-0:1.0.1e-42.el6_7.4
  • openssl-1:1.0.1e-51.el7_2.4
  • openssl-debuginfo-0:1.0.1e-42.el6_7.4
  • openssl-debuginfo-1:1.0.1e-51.el7_2.4
  • openssl-devel-0:1.0.1e-42.el6_7.4
  • openssl-devel-1:1.0.1e-51.el7_2.4
  • openssl-libs-1:1.0.1e-51.el7_2.4
  • openssl-perl-0:1.0.1e-42.el6_7.4
  • openssl-perl-1:1.0.1e-51.el7_2.4
  • openssl-static-0:1.0.1e-42.el6_7.4
  • openssl-static-1:1.0.1e-51.el7_2.4
  • rhev-hypervisor7-0:7.2-20160302.1.el6ev
  • rhev-hypervisor7-0:7.2-20160302.1.el7ev
  • java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el7
  • java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el7
  • java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el7
  • java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el7
  • java-1.8.0-ibm-plugin-1:1.8.0.5.20-1jpp.1.el7
  • java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el7
  • java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el6_10
  • java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el6_10
  • java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el6_10
  • java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el6_10
  • java-1.8.0-ibm-plugin-1:1.8.0.5.20-1jpp.1.el6_10
  • java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el6_10
  • java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el6_10
  • java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el6_10
refmap via4
bid
  • 83754
  • 91787
cisco 20160302 Multiple Vulnerabilities in OpenSSL Affecting Cisco Products: March 2016
confirm
debian DSA-3500
fedora
  • FEDORA-2016-2802690366
  • FEDORA-2016-e6807b3394
freebsd FreeBSD-SA-16:12
gentoo GLSA-201603-15
hp
  • HPSBGN03563
  • HPSBGN03569
  • HPSBMU03575
sectrack 1035133
suse
  • SUSE-SU-2016:0617
  • SUSE-SU-2016:0620
  • SUSE-SU-2016:0621
  • SUSE-SU-2016:0624
  • SUSE-SU-2016:0631
  • SUSE-SU-2016:1057
  • openSUSE-SU-2016:0627
  • openSUSE-SU-2016:0628
  • openSUSE-SU-2016:0637
  • openSUSE-SU-2016:0638
  • openSUSE-SU-2016:1332
  • openSUSE-SU-2016:1566
ubuntu USN-2914-1
Last major update 13-12-2022 - 12:15
Published 03-03-2016 - 20:59
Last modified 13-12-2022 - 12:15
Back to Top