CVE-2016-8610

Scores

EPSS

0.711medium71.1%
0%20%40%60%80%100%

Percentile: 71.1%

CVSS

7.5high3.x
0246810

CVSS Score: 7.5/10

All CVSS Scores

CVSS 3.x
7.5

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

CVSS 2.0
4.3

Vector: AV:N/AC:M/Au:N/C:N/I:N/A:P

Description

A denial of service flaw was found in OpenSSL 0.9.8, 1.0.1, 1.0.2 through 1.0.2h, and 1.1.0 in the way the TLS/SSL protocol defined processing of ALERT packets during a connection handshake. A remote attacker could use this flaw to make a TLS/SSL server consume an excessive amount of CPU and fail to accept connections from other clients.

Scaner-VS 7 — a modern vulnerability management solution

Uses this database for vulnerability detection. High-speed search, cross-platform, advanced configuration audit, and flexible filtering. Suitable for organizations of any size.
Learn more about Scaner-VS 7

Sources

debiannvdredhatubuntu

CWEs

CWE-400

Exploits

Exploit ID: CVE-2016-8610

Source: github-poc

URL: https://github.com/cujanovic/CVE-2016-8610-PoC

Recommendations

Source: nvd

Before applying the update, back up your existing Red Hat JBoss Web Server installation (including all applications and configuration files).
The References section of this erratum contains a download link (you must log in to download the update).

URL: https://access.redhat.com/errata/RHSA-2017:2494

Source: nvd

Before applying the update, back up your existing Red Hat JBoss Web Server installation (including all applications and configuration files).
For details on how to apply this update, which includes the changes described in this advisory, refer to:
https://access.redhat.com/articles/11258
For the update to take effect, all services linked to the OpenSSL library must be restarted, or the system rebooted. After installing the updated packages, the httpd daemon will be restarted automatically.

URL: https://access.redhat.com/errata/RHSA-2017:2493

Source: nvd

For details on how to apply this update, which includes the changes described in this advisory, refer to:
https://access.redhat.com/articles/11258

URL: http://rhn.redhat.com/errata/RHSA-2017-0574.html

Source: nvd

For details on how to apply this update, which includes the changes described in this advisory, refer to:
https://access.redhat.com/articles/11258
For the update to take effect, all services linked to the OpenSSL library must be restarted, or the system rebooted.

URL: http://rhn.redhat.com/errata/RHSA-2017-0286.html

Vulnerable Software (89)

Type: Configuration

Product: gnutls

Operating System: rhel 6

Trait:
{  "fixed": "2.12.23-21.el6"}

Source: redhat

Type: Configuration

Product: gnutls26

Operating System: ubuntu trusty 14.04

Trait:
{  "fixed": "2.12.23-12ubuntu2.7"}

Source: ubuntu

Type: Configuration

Product: gnutls28

Operating System: ubuntu artful 17.10

Trait:
{  "unaffected": true}

Source: ubuntu

Type: Configuration

Product: gnutls28

Operating System: ubuntu bionic 18.04

Trait:
{  "unaffected": true}

Source: ubuntu

Type: Configuration

Product: gnutls28

Operating System: ubuntu cosmic 18.10

Trait:
{  "unaffected": true}

Source: ubuntu

Type: Configuration

Product: gnutls28

Operating System: ubuntu disco 19.04

Trait:
{  "unaffected": true}

Source: ubuntu

Type: Configuration

Product: gnutls28

Operating System: ubuntu trusty 14.04

Trait:
{  "unfixed": true}

Source: ubuntu

Type: Configuration

Product: gnutls28

Operating System: ubuntu xenial 16.04

Trait:
{  "fixed": "3.4.10-4ubuntu1.2"}

Source: ubuntu

Type: Configuration

Product: gnutls28

Operating System: ubuntu yakkety 16.10

Trait:
{  "fixed": "3.5.3-5ubuntu1.1"}

Source: ubuntu

Type: Configuration

Product: gnutls28

Operating System: ubuntu zesty 17.04

Trait:
{  "unaffected": true}

Source: ubuntu

Type: Configuration

Product: jbcs-httpd24-httpd

Operating System: rhel

Trait:
{  "fixed": "2.4.23-120.jbcs.el6"}

Source: redhat

Type: Configuration

Product: jbcs-httpd24-httpd

Operating System: rhel

Trait:
{  "fixed": "2.4.23-120.jbcs.el7"}

Source: redhat

Type: Configuration

Product: jbcs-httpd24-mod_security

Operating System: rhel

Trait:
{  "fixed": "2.9.1-19.GA.jbcs.el6"}

Source: redhat

Type: Configuration

Product: jbcs-httpd24-mod_security

Operating System: rhel

Trait:
{  "fixed": "2.9.1-19.GA.jbcs.el7"}

Source: redhat

Type: Configuration

Product: jbcs-httpd24-openssl

Operating System: rhel

Trait:
{  "fixed": "1.0.2h-13.jbcs.el6"}

Source: redhat

Type: Configuration

Product: jbcs-httpd24-openssl

Operating System: rhel

Trait:
{  "fixed": "1.0.2h-13.jbcs.el7"}

Source: redhat

Type: Configuration

Product: jbcs-httpd24-openssl

Operating System: rhel

Trait:
{  "fixed": "1.0.2h-13.jbcs.el6"}

Source: redhat

Type: Configuration

Product: jbcs-httpd24-openssl

Operating System: rhel

Trait:
{  "fixed": "1.0.2h-13.jbcs.el7"}

Source: redhat

Type: Configuration

Product: jbcs-httpd24-openssl

Operating System: rhel

Trait:
{  "fixed": "1.0.2h-13.jbcs.el6"}

Source: redhat

Type: Configuration

Product: jbcs-httpd24-openssl

Operating System: rhel

Trait:
{  "fixed": "1.0.2h-13.jbcs.el7"}

Source: redhat