A denial of service flaw was found in OpenSSL 0.9.8, 1.0.1, 1.0.2 through 1.0.2h, and 1.1.0 in the way the TLS/SSL protocol defined processing of ALERT packets during a connection handshake. A remote attacker could use this flaw to make a TLS/SSL server consume an excessive amount of CPU and fail to accept connections from other clients.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
Configuration 4 (hide)
| AND |
|
Configuration 5 (hide)
| AND |
|
Configuration 6 (hide)
|
Configuration 7 (hide)
|
Configuration 8 (hide)
|
Configuration 9 (hide)
| AND |
|
Configuration 10 (hide)
| AND |
|
Configuration 11 (hide)
| AND |
|
Configuration 12 (hide)
| AND |
|
Configuration 13 (hide)
| AND |
|
Configuration 14 (hide)
| AND |
|
History
26 Jan 2024, 17:44
| Type | Values Removed | Values Added |
|---|---|---|
| CPE | cpe:2.3:a:oracle:enterprise_manager_ops_center:12.3.3:*:*:*:*:*:*:* cpe:2.3:a:oracle:retail_predictive_application_server:16.0.3:*:*:*:*:*:*:* cpe:2.3:o:fujitsu:m12-2_firmware:*:*:*:*:*:*:*:* cpe:2.3:h:fujitsu:m10-4s:-:*:*:*:*:*:*:* cpe:2.3:a:oracle:jd_edwards_enterpriseone_tools:9.2:*:*:*:*:*:*:* cpe:2.3:h:fujitsu:m12-2:-:*:*:*:*:*:*:* cpe:2.3:a:oracle:core_rdbms:19c:*:*:*:*:*:*:* cpe:2.3:o:fujitsu:m10-4s_firmware:*:*:*:*:*:*:*:* cpe:2.3:a:oracle:peoplesoft_enterprise_peopletools:8.57:*:*:*:*:*:*:* cpe:2.3:a:oracle:weblogic_server:10.3.6.0.0:*:*:*:*:*:*:* cpe:2.3:a:oracle:communications_ip_service_activator:7.4.0:*:*:*:*:*:*:* cpe:2.3:a:oracle:core_rdbms:11.2.0.4:*:*:*:*:*:*:* cpe:2.3:o:paloaltonetworks:pan-os:*:*:*:*:*:*:*:* cpe:2.3:a:oracle:goldengate_application_adapters:12.3.2.1.0:*:*:*:*:*:*:* cpe:2.3:a:oracle:adaptive_access_manager:11.1.2.3.0:*:*:*:*:*:*:* cpe:2.3:a:oracle:core_rdbms:12.2.0.1:*:*:*:*:*:*:* cpe:2.3:a:oracle:core_rdbms:12.1.0.2:*:*:*:*:*:*:* cpe:2.3:h:fujitsu:m10-1:-:*:*:*:*:*:*:* cpe:2.3:o:fujitsu:m12-2s_firmware:*:*:*:*:*:*:*:* cpe:2.3:a:oracle:peoplesoft_enterprise_peopletools:8.58:*:*:*:*:*:*:* cpe:2.3:a:oracle:timesten_in-memory_database:*:*:*:*:*:*:*:* cpe:2.3:o:fujitsu:m10-4_firmware:*:*:*:*:*:*:*:* cpe:2.3:h:fujitsu:m10-4:-:*:*:*:*:*:*:* cpe:2.3:o:fujitsu:m12-1_firmware:*:*:*:*:*:*:*:* cpe:2.3:a:oracle:weblogic_server:12.2.1.3.0:*:*:*:*:*:*:* cpe:2.3:a:oracle:communications_ip_service_activator:7.3.4:*:*:*:*:*:*:* cpe:2.3:a:oracle:retail_predictive_application_server:15.0.3:*:*:*:*:*:*:* cpe:2.3:a:oracle:weblogic_server:12.1.3.0.0:*:*:*:*:*:*:* cpe:2.3:a:oracle:weblogic_server:12.2.1.4.0:*:*:*:*:*:*:* cpe:2.3:o:fujitsu:m10-1_firmware:*:*:*:*:*:*:*:* cpe:2.3:a:oracle:communications_analytics:12.1.1:*:*:*:*:*:*:* cpe:2.3:a:oracle:core_rdbms:18c:*:*:*:*:*:*:* cpe:2.3:a:oracle:enterprise_manager_ops_center:12.4.0:*:*:*:*:*:*:* cpe:2.3:a:oracle:application_testing_suite:13.3.0.1:*:*:*:*:*:*:* cpe:2.3:a:oracle:peoplesoft_enterprise_peopletools:8.56:*:*:*:*:*:*:* cpe:2.3:h:fujitsu:m12-1:-:*:*:*:*:*:*:* cpe:2.3:h:fujitsu:m12-2s:-:*:*:*:*:*:*:* |
|
| First Time |
Oracle adaptive Access Manager
Oracle communications Ip Service Activator Fujitsu m12-2s Fujitsu m10-4 Firmware Paloaltonetworks pan-os Fujitsu m12-2s Firmware Fujitsu m10-4s Firmware Oracle retail Predictive Application Server Fujitsu m12-2 Firmware Fujitsu m10-1 Fujitsu m12-1 Fujitsu m12-1 Firmware Fujitsu Oracle core Rdbms Oracle timesten In-memory Database Oracle Paloaltonetworks Fujitsu m10-4 Fujitsu m10-1 Firmware Oracle goldengate Application Adapters Fujitsu m10-4s Fujitsu m12-2 Oracle application Testing Suite Oracle communications Analytics Oracle peoplesoft Enterprise Peopletools Oracle enterprise Manager Ops Center Oracle jd Edwards Enterpriseone Tools Oracle weblogic Server |
|
| References | () https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commit%3Bh=af58be768ebb690f78530f796e92b8ae5c9a4401 - Broken Link | |
| References | () https://security.paloaltonetworks.com/CVE-2016-8610 - Third Party Advisory | |
| References | () https://www.oracle.com/security-alerts/cpuapr2020.html - Patch, Third Party Advisory | |
| References | () https://www.oracle.com/security-alerts/cpujan2020.html - Patch, Third Party Advisory | |
| References | () https://www.oracle.com/security-alerts/cpujul2020.html - Patch, Third Party Advisory | |
| References | () https://www.oracle.com/security-alerts/cpuoct2020.html - Patch, Third Party Advisory | |
| References | () https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html - Patch, Third Party Advisory | |
| References | () https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html - Patch, Third Party Advisory |
Information
Published : 2017-11-13 22:29
Updated : 2024-01-26 17:44
NVD link : CVE-2016-8610
Mitre link : CVE-2016-8610
CVE.ORG link : CVE-2016-8610
JSON object : View
Products Affected
redhat
- enterprise_linux_server
- jboss_enterprise_application_platform
- enterprise_linux_server_aus
- enterprise_linux_server_eus
- enterprise_linux
- enterprise_linux_desktop
- enterprise_linux_workstation
- enterprise_linux_server_tus
netapp
- data_ontap
- cn1610
- e-series_santricity_os_controller
- oncommand_balance
- oncommand_unified_manager
- cn1610_firmware
- smi-s_provider
- snapcenter_server
- data_ontap_edge
- clustered_data_ontap
- host_agent
- snapdrive
- ontap_select_deploy
- oncommand_workflow_automation
- storagegrid
- service_processor
- storagegrid_webscale
- clustered_data_ontap_antivirus_connector
fujitsu
- m12-2s
- m10-1
- m10-1_firmware
- m10-4s
- m10-4s_firmware
- m10-4_firmware
- m10-4
- m12-1_firmware
- m12-2_firmware
- m12-1
- m12-2s_firmware
- m12-2
oracle
- goldengate_application_adapters
- communications_ip_service_activator
- timesten_in-memory_database
- core_rdbms
- weblogic_server
- peoplesoft_enterprise_peopletools
- adaptive_access_manager
- application_testing_suite
- enterprise_manager_ops_center
- communications_analytics
- retail_predictive_application_server
- jd_edwards_enterpriseone_tools
debian
- debian_linux
openssl
- openssl
paloaltonetworks
- pan-os
CWE
CWE-400
Uncontrolled Resource Consumption
