CVE-2016-2177 (CNNVD-201606-266)
CRITICAL
中文标题:
OpenSSL 拒绝服务漏洞
英文标题:
OpenSSL through 1.0.2h incorrectly uses pointer arithmetic for heap-buffer boundary checks, which mi...
CVSS分数:
9.8
发布时间:
2016-06-20 00:00:00
漏洞类型:
输入验证错误
状态:
PUBLISHED
数据质量分数:
0.30
数据版本:
v3
漏洞描述
中文描述:
OpenSSL是OpenSSL团队开发的一个开源的能够实现安全套接层(SSL v2/v3)和安全传输层(TLS v1)协议的通用加密库,它支持多种加密算法,包括对称密码、哈希算法、安全散列算法等。 OpenSSL 1.0.2h及之前版本中存在安全漏洞,该漏洞源于程序使用指针运算进行堆缓冲区边界检查。远程攻击者可借助错误的内存分配利用该漏洞造成拒绝服务(整数溢出和应用程序崩溃)。
英文描述:
OpenSSL through 1.0.2h incorrectly uses pointer arithmetic for heap-buffer boundary checks, which might allow remote attackers to cause a denial of service (integer overflow and application crash) or possibly have unspecified other impact by leveraging unexpected malloc behavior, related to s3_srvr.c, ssl_sess.c, and t1_lib.c.
CWE类型:
CWE-190
标签:
(暂无数据)
受影响产品
| 厂商 | 产品 | 版本 | 版本范围 | 平台 | CPE |
|---|---|---|---|---|---|
| hp | icewall_mcrp | 3.0 | - | - |
cpe:2.3:a:hp:icewall_mcrp:3.0:*:*:*:*:*:*:*
|
| hp | icewall_sso | 10.0 | - | - |
cpe:2.3:a:hp:icewall_sso:10.0:*:*:*:certd:*:*:*
|
| hp | icewall_sso_agent_option | 10.0 | - | - |
cpe:2.3:a:hp:icewall_sso_agent_option:10.0:*:*:*:*:*:*:*
|
| openssl | openssl | 1.0.1 | - | - |
cpe:2.3:a:openssl:openssl:1.0.1:*:*:*:*:*:*:*
|
| openssl | openssl | 1.0.1a | - | - |
cpe:2.3:a:openssl:openssl:1.0.1a:*:*:*:*:*:*:*
|
| openssl | openssl | 1.0.1b | - | - |
cpe:2.3:a:openssl:openssl:1.0.1b:*:*:*:*:*:*:*
|
| openssl | openssl | 1.0.1c | - | - |
cpe:2.3:a:openssl:openssl:1.0.1c:*:*:*:*:*:*:*
|
| openssl | openssl | 1.0.1d | - | - |
cpe:2.3:a:openssl:openssl:1.0.1d:*:*:*:*:*:*:*
|
| openssl | openssl | 1.0.1e | - | - |
cpe:2.3:a:openssl:openssl:1.0.1e:*:*:*:*:*:*:*
|
| openssl | openssl | 1.0.1f | - | - |
cpe:2.3:a:openssl:openssl:1.0.1f:*:*:*:*:*:*:*
|
| openssl | openssl | 1.0.1g | - | - |
cpe:2.3:a:openssl:openssl:1.0.1g:*:*:*:*:*:*:*
|
| openssl | openssl | 1.0.1h | - | - |
cpe:2.3:a:openssl:openssl:1.0.1h:*:*:*:*:*:*:*
|
| openssl | openssl | 1.0.1i | - | - |
cpe:2.3:a:openssl:openssl:1.0.1i:*:*:*:*:*:*:*
|
| openssl | openssl | 1.0.1j | - | - |
cpe:2.3:a:openssl:openssl:1.0.1j:*:*:*:*:*:*:*
|
| openssl | openssl | 1.0.1k | - | - |
cpe:2.3:a:openssl:openssl:1.0.1k:*:*:*:*:*:*:*
|
| openssl | openssl | 1.0.1l | - | - |
cpe:2.3:a:openssl:openssl:1.0.1l:*:*:*:*:*:*:*
|
| openssl | openssl | 1.0.1m | - | - |
cpe:2.3:a:openssl:openssl:1.0.1m:*:*:*:*:*:*:*
|
| openssl | openssl | 1.0.1n | - | - |
cpe:2.3:a:openssl:openssl:1.0.1n:*:*:*:*:*:*:*
|
| openssl | openssl | 1.0.1o | - | - |
cpe:2.3:a:openssl:openssl:1.0.1o:*:*:*:*:*:*:*
|
| openssl | openssl | 1.0.1p | - | - |
cpe:2.3:a:openssl:openssl:1.0.1p:*:*:*:*:*:*:*
|
| openssl | openssl | 1.0.1q | - | - |
cpe:2.3:a:openssl:openssl:1.0.1q:*:*:*:*:*:*:*
|
| openssl | openssl | 1.0.1r | - | - |
cpe:2.3:a:openssl:openssl:1.0.1r:*:*:*:*:*:*:*
|
| openssl | openssl | 1.0.1s | - | - |
cpe:2.3:a:openssl:openssl:1.0.1s:*:*:*:*:*:*:*
|
| openssl | openssl | 1.0.1t | - | - |
cpe:2.3:a:openssl:openssl:1.0.1t:*:*:*:*:*:*:*
|
| openssl | openssl | 1.0.2 | - | - |
cpe:2.3:a:openssl:openssl:1.0.2:*:*:*:*:*:*:*
|
| openssl | openssl | 1.0.2a | - | - |
cpe:2.3:a:openssl:openssl:1.0.2a:*:*:*:*:*:*:*
|
| openssl | openssl | 1.0.2b | - | - |
cpe:2.3:a:openssl:openssl:1.0.2b:*:*:*:*:*:*:*
|
| openssl | openssl | 1.0.2c | - | - |
cpe:2.3:a:openssl:openssl:1.0.2c:*:*:*:*:*:*:*
|
| openssl | openssl | 1.0.2d | - | - |
cpe:2.3:a:openssl:openssl:1.0.2d:*:*:*:*:*:*:*
|
| openssl | openssl | 1.0.2e | - | - |
cpe:2.3:a:openssl:openssl:1.0.2e:*:*:*:*:*:*:*
|
| openssl | openssl | 1.0.2f | - | - |
cpe:2.3:a:openssl:openssl:1.0.2f:*:*:*:*:*:*:*
|
| openssl | openssl | 1.0.2g | - | - |
cpe:2.3:a:openssl:openssl:1.0.2g:*:*:*:*:*:*:*
|
| openssl | openssl | 1.0.2h | - | - |
cpe:2.3:a:openssl:openssl:1.0.2h:*:*:*:*:*:*:*
|
| oracle | linux | 5 | - | - |
cpe:2.3:o:oracle:linux:5:*:*:*:*:*:*:*
|
| oracle | linux | 6 | - | - |
cpe:2.3:o:oracle:linux:6:*:*:*:*:*:*:*
|
| oracle | linux | 7 | - | - |
cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*
|
| oracle | solaris | 10 | - | - |
cpe:2.3:o:oracle:solaris:10:*:*:*:*:*:*:*
|
| oracle | solaris | 11.3 | - | - |
cpe:2.3:o:oracle:solaris:11.3:*:*:*:*:*:*:*
|
解决方案
中文解决方案:
(暂无数据)
英文解决方案:
(暂无数据)
临时解决方案:
(暂无数据)
参考链接
无标题
OTHER
cve.org
访问
cve.org
无标题
OTHER
cve.org
访问
cve.org
无标题
OTHER
cve.org
访问
cve.org
RHSA-2017:1659
vendor-advisory
cve.org
访问
cve.org
RHSA-2017:1658
vendor-advisory
cve.org
访问
cve.org
RHSA-2016:1940
vendor-advisory
cve.org
访问
cve.org
1036088
vdb-entry
cve.org
访问
cve.org
无标题
OTHER
cve.org
访问
cve.org
GLSA-201612-16
vendor-advisory
cve.org
访问
cve.org
无标题
OTHER
cve.org
访问
cve.org
无标题
OTHER
cve.org
访问
cve.org
无标题
OTHER
cve.org
访问
cve.org
无标题
OTHER
cve.org
访问
cve.org
无标题
OTHER
cve.org
访问
cve.org
无标题
OTHER
cve.org
访问
cve.org
无标题
OTHER
cve.org
访问
cve.org
无标题
OTHER
cve.org
访问
cve.org
无标题
OTHER
cve.org
访问
cve.org
无标题
OTHER
cve.org
访问
cve.org
无标题
OTHER
cve.org
访问
cve.org
无标题
OTHER
cve.org
访问
cve.org
RHSA-2017:0194
vendor-advisory
cve.org
访问
cve.org
RHSA-2017:0193
vendor-advisory
cve.org
访问
cve.org
无标题
OTHER
cve.org
访问
cve.org
无标题
OTHER
cve.org
访问
cve.org
RHSA-2016:2957
vendor-advisory
cve.org
访问
cve.org
无标题
OTHER
cve.org
访问
cve.org
无标题
OTHER
cve.org
访问
cve.org
无标题
OTHER
cve.org
访问
cve.org
91319
vdb-entry
cve.org
访问
cve.org
无标题
OTHER
cve.org
访问
cve.org
FreeBSD-SA-16:26
vendor-advisory
cve.org
访问
cve.org
无标题
OTHER
cve.org
访问
cve.org
无标题
OTHER
cve.org
访问
cve.org
无标题
OTHER
cve.org
访问
cve.org
无标题
OTHER
cve.org
访问
cve.org
无标题
OTHER
cve.org
访问
cve.org
[oss-security] 20160608 CVE-2016-2177: OpenSSL undefined pointer arithmetic
mailing-list
cve.org
访问
cve.org
无标题
OTHER
cve.org
访问
cve.org
SUSE-SU-2017:2700
vendor-advisory
cve.org
访问
cve.org
USN-3087-1
vendor-advisory
cve.org
访问
cve.org
SUSE-SU-2016:2469
vendor-advisory
cve.org
访问
cve.org
20160927 Multiple Vulnerabilities in OpenSSL Affecting Cisco Products: September 2016
vendor-advisory
cve.org
访问
cve.org
openSUSE-SU-2016:2537
vendor-advisory
cve.org
访问
cve.org
USN-3087-2
vendor-advisory
cve.org
访问
cve.org
20170801 [security bulletin] HPESBHF03763 rev.1 - HPE Comware 7, IMC, VCX products using OpenSSL, Remote Denial of Service (DoS)
mailing-list
cve.org
访问
cve.org
SUSE-SU-2017:2699
vendor-advisory
cve.org
访问
cve.org
20170801 [security bulletin] HPESBHF03763 rev.1 - HPE Comware 7, IMC, VCX products using OpenSSL, Remote Denial of Service (DoS)
mailing-list
cve.org
访问
cve.org
openSUSE-SU-2016:2407
vendor-advisory
cve.org
访问
cve.org
20170717 Orion Elite Hidden IP Browser Pro - All Versions - Multiple Known Vulnerabilities
mailing-list
cve.org
访问
cve.org
USN-3181-1
vendor-advisory
cve.org
访问
cve.org
SUSE-SU-2016:2458
vendor-advisory
cve.org
访问
cve.org
无标题
OTHER
cve.org
访问
cve.org
无标题
OTHER
cve.org
访问
cve.org
DSA-3673
vendor-advisory
cve.org
访问
cve.org
openSUSE-SU-2016:2391
vendor-advisory
cve.org
访问
cve.org
openSUSE-SU-2018:0458
vendor-advisory
cve.org
访问
cve.org
SUSE-SU-2016:2387
vendor-advisory
cve.org
访问
cve.org
无标题
OTHER
cve.org
访问
cve.org
SUSE-SU-2016:2468
vendor-advisory
cve.org
访问
cve.org
SUSE-SU-2016:2394
vendor-advisory
cve.org
访问
cve.org
无标题
OTHER
cve.org
访问
cve.org
无标题
OTHER
cve.org
访问
cve.org
无标题
OTHER
cve.org
访问
cve.org
CVSS评分详情
9.8
CRITICAL
CVSS向量:
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
CVSS版本:
3.0
机密性
HIGH
完整性
HIGH
可用性
HIGH
时间信息
发布时间:
2016-06-20 00:00:00
修改时间:
2024-08-05 23:17:50
创建时间:
2025-11-11 15:34:16
更新时间:
2025-11-11 15:52:29
利用信息
暂无可利用代码信息
数据源详情
| 数据源 | 记录ID | 版本 | 提取时间 |
|---|---|---|---|
| CVE | cve_CVE-2016-2177 |
2025-11-11 15:19:06 | 2025-11-11 07:34:16 |
| NVD | nvd_CVE-2016-2177 |
2025-11-11 14:55:07 | 2025-11-11 07:42:57 |
| CNNVD | cnnvd_CNNVD-201606-266 |
2025-11-11 15:09:40 | 2025-11-11 07:52:29 |
版本与语言
当前版本:
v3
主要语言:
EN
支持语言:
EN
ZH
安全公告
暂无安全公告信息
变更历史
v3
CNNVD
2025-11-11 15:52:29
vulnerability_type: 未提取 → 输入验证错误; cnnvd_id: 未提取 → CNNVD-201606-266; data_sources: ['cve', 'nvd'] → ['cnnvd', 'cve', 'nvd']
查看详细变更
- vulnerability_type: 未提取 -> 输入验证错误
- cnnvd_id: 未提取 -> CNNVD-201606-266
- data_sources: ['cve', 'nvd'] -> ['cnnvd', 'cve', 'nvd']
v2
NVD
2025-11-11 15:42:57
severity: SeverityLevel.MEDIUM → SeverityLevel.CRITICAL; cvss_score: 未提取 → 9.8; cvss_vector: NOT_EXTRACTED → CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H; cvss_version: NOT_EXTRACTED → 3.0; affected_products_count: 0 → 38; data_sources: ['cve'] → ['cve', 'nvd']
查看详细变更
- severity: SeverityLevel.MEDIUM -> SeverityLevel.CRITICAL
- cvss_score: 未提取 -> 9.8
- cvss_vector: NOT_EXTRACTED -> CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
- cvss_version: NOT_EXTRACTED -> 3.0
- affected_products_count: 0 -> 38
- data_sources: ['cve'] -> ['cve', 'nvd']