CVE-2016-8610 (CNNVD-201610-726)

HIGH
中文标题:
OpenSSL 资源管理错误漏洞
英文标题:
A denial of service flaw was found in OpenSSL 0.9.8, 1.0.1, 1.0.2 through 1.0.2h, and 1.1.0 in the w...
CVSS分数: 7.5
发布时间: 2017-11-13 22:00:00
漏洞类型: 资源管理错误
状态: PUBLISHED
数据质量分数: 0.30
数据版本: v3
漏洞描述
中文描述:

OpenSSL是OpenSSL团队开发的一个开源的能够实现安全套接层(SSL v2/v3)和安全传输层(TLS v1)协议的通用加密库,它支持多种加密算法,包括对称密码、哈希算法、安全散列算法等。 OpenSSL中的ALERT数据包的处理存在拒绝服务漏洞。远程攻击者可利用该漏洞造成TLS/SSL服务器消耗大量的CPU,并使设备无法接受其他客户端的连接。以下版本受到影响:OpenSSL 0.9.8版本,1.0.1版本,1.0.2版本至1.0.2h版本,1.1.0版本。

英文描述:

A denial of service flaw was found in OpenSSL 0.9.8, 1.0.1, 1.0.2 through 1.0.2h, and 1.1.0 in the way the TLS/SSL protocol defined processing of ALERT packets during a connection handshake. A remote attacker could use this flaw to make a TLS/SSL server consume an excessive amount of CPU and fail to accept connections from other clients.

CWE类型:
CWE-400
标签:
(暂无数据)
受影响产品
厂商 产品 版本 版本范围 平台 CPE
OpenSSL OpenSSL All 0.9.8 - - cpe:2.3:a:openssl:openssl:all_0.9.8:*:*:*:*:*:*:*
OpenSSL OpenSSL All 1.0.1 - - cpe:2.3:a:openssl:openssl:all_1.0.1:*:*:*:*:*:*:*
OpenSSL OpenSSL 1.0.2 through 1.0.2h - - cpe:2.3:a:openssl:openssl:1.0.2_through_1.0.2h:*:*:*:*:*:*:*
OpenSSL OpenSSL 1.1.0 - - cpe:2.3:a:openssl:openssl:1.1.0:*:*:*:*:*:*:*
openssl openssl * - - cpe:2.3:a:openssl:openssl:*:*:*:*:*:*:*:*
openssl openssl 0.9.8 - - cpe:2.3:a:openssl:openssl:0.9.8:*:*:*:*:*:*:*
openssl openssl 1.0.1 - - cpe:2.3:a:openssl:openssl:1.0.1:*:*:*:*:*:*:*
openssl openssl 1.1.0 - - cpe:2.3:a:openssl:openssl:1.1.0:*:*:*:*:*:*:*
debian debian_linux 8.0 - - cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
redhat enterprise_linux_desktop 6.0 - - cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
redhat enterprise_linux_desktop 7.0 - - cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
redhat enterprise_linux_server 6.0 - - cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
redhat enterprise_linux_server 7.0 - - cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
redhat enterprise_linux_server_aus 7.3 - - cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*
redhat enterprise_linux_server_aus 7.4 - - cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*
redhat enterprise_linux_server_aus 7.6 - - cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*
redhat enterprise_linux_server_eus 7.3 - - cpe:2.3:o:redhat:enterprise_linux_server_eus:7.3:*:*:*:*:*:*:*
redhat enterprise_linux_server_eus 7.4 - - cpe:2.3:o:redhat:enterprise_linux_server_eus:7.4:*:*:*:*:*:*:*
redhat enterprise_linux_server_eus 7.5 - - cpe:2.3:o:redhat:enterprise_linux_server_eus:7.5:*:*:*:*:*:*:*
redhat enterprise_linux_server_eus 7.6 - - cpe:2.3:o:redhat:enterprise_linux_server_eus:7.6:*:*:*:*:*:*:*
redhat enterprise_linux_server_tus 7.3 - - cpe:2.3:o:redhat:enterprise_linux_server_tus:7.3:*:*:*:*:*:*:*
redhat enterprise_linux_server_tus 7.6 - - cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*
redhat enterprise_linux_workstation 6.0 - - cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
redhat enterprise_linux_workstation 7.0 - - cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
redhat jboss_enterprise_application_platform 6.0.0 - - cpe:2.3:a:redhat:jboss_enterprise_application_platform:6.0.0:*:*:*:*:*:*:*
redhat jboss_enterprise_application_platform 6.4.0 - - cpe:2.3:a:redhat:jboss_enterprise_application_platform:6.4.0:*:*:*:*:*:*:*
netapp cn1610_firmware - - - cpe:2.3:o:netapp:cn1610_firmware:-:*:*:*:*:*:*:*
netapp clustered_data_ontap_antivirus_connector - - - cpe:2.3:a:netapp:clustered_data_ontap_antivirus_connector:-:*:*:*:*:*:*:*
netapp data_ontap - - - cpe:2.3:a:netapp:data_ontap:-:*:*:*:*:7-mode:*:*
netapp data_ontap_edge - - - cpe:2.3:a:netapp:data_ontap_edge:-:*:*:*:*:*:*:*
netapp e-series_santricity_os_controller * - - cpe:2.3:a:netapp:e-series_santricity_os_controller:*:*:*:*:*:*:*:*
netapp host_agent - - - cpe:2.3:a:netapp:host_agent:-:*:*:*:*:*:*:*
netapp oncommand_balance - - - cpe:2.3:a:netapp:oncommand_balance:-:*:*:*:*:*:*:*
netapp oncommand_unified_manager - - - cpe:2.3:a:netapp:oncommand_unified_manager:-:*:*:*:*:7-mode:*:*
netapp oncommand_workflow_automation - - - cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*
netapp ontap_select_deploy - - - cpe:2.3:a:netapp:ontap_select_deploy:-:*:*:*:*:*:*:*
netapp service_processor - - - cpe:2.3:a:netapp:service_processor:-:*:*:*:*:*:*:*
netapp smi-s_provider - - - cpe:2.3:a:netapp:smi-s_provider:-:*:*:*:*:*:*:*
netapp snapcenter_server - - - cpe:2.3:a:netapp:snapcenter_server:-:*:*:*:*:*:*:*
netapp snapdrive - - - cpe:2.3:a:netapp:snapdrive:-:*:*:*:*:unix:*:*
netapp storagegrid - - - cpe:2.3:a:netapp:storagegrid:-:*:*:*:*:*:*:*
netapp storagegrid_webscale - - - cpe:2.3:a:netapp:storagegrid_webscale:-:*:*:*:*:*:*:*
netapp clustered_data_ontap - - - cpe:2.3:o:netapp:clustered_data_ontap:-:*:*:*:*:*:*:*
paloaltonetworks pan-os * - - cpe:2.3:o:paloaltonetworks:pan-os:*:*:*:*:*:*:*:*
oracle adaptive_access_manager 11.1.2.3.0 - - cpe:2.3:a:oracle:adaptive_access_manager:11.1.2.3.0:*:*:*:*:*:*:*
oracle application_testing_suite 13.3.0.1 - - cpe:2.3:a:oracle:application_testing_suite:13.3.0.1:*:*:*:*:*:*:*
oracle communications_analytics 12.1.1 - - cpe:2.3:a:oracle:communications_analytics:12.1.1:*:*:*:*:*:*:*
oracle communications_ip_service_activator 7.3.4 - - cpe:2.3:a:oracle:communications_ip_service_activator:7.3.4:*:*:*:*:*:*:*
oracle communications_ip_service_activator 7.4.0 - - cpe:2.3:a:oracle:communications_ip_service_activator:7.4.0:*:*:*:*:*:*:*
oracle core_rdbms 11.2.0.4 - - cpe:2.3:a:oracle:core_rdbms:11.2.0.4:*:*:*:*:*:*:*
oracle core_rdbms 12.1.0.2 - - cpe:2.3:a:oracle:core_rdbms:12.1.0.2:*:*:*:*:*:*:*
oracle core_rdbms 12.2.0.1 - - cpe:2.3:a:oracle:core_rdbms:12.2.0.1:*:*:*:*:*:*:*
oracle core_rdbms 18c - - cpe:2.3:a:oracle:core_rdbms:18c:*:*:*:*:*:*:*
oracle core_rdbms 19c - - cpe:2.3:a:oracle:core_rdbms:19c:*:*:*:*:*:*:*
oracle enterprise_manager_ops_center 12.3.3 - - cpe:2.3:a:oracle:enterprise_manager_ops_center:12.3.3:*:*:*:*:*:*:*
oracle enterprise_manager_ops_center 12.4.0 - - cpe:2.3:a:oracle:enterprise_manager_ops_center:12.4.0:*:*:*:*:*:*:*
oracle goldengate_application_adapters 12.3.2.1.0 - - cpe:2.3:a:oracle:goldengate_application_adapters:12.3.2.1.0:*:*:*:*:*:*:*
oracle jd_edwards_enterpriseone_tools 9.2 - - cpe:2.3:a:oracle:jd_edwards_enterpriseone_tools:9.2:*:*:*:*:*:*:*
oracle peoplesoft_enterprise_peopletools 8.56 - - cpe:2.3:a:oracle:peoplesoft_enterprise_peopletools:8.56:*:*:*:*:*:*:*
oracle peoplesoft_enterprise_peopletools 8.57 - - cpe:2.3:a:oracle:peoplesoft_enterprise_peopletools:8.57:*:*:*:*:*:*:*
oracle peoplesoft_enterprise_peopletools 8.58 - - cpe:2.3:a:oracle:peoplesoft_enterprise_peopletools:8.58:*:*:*:*:*:*:*
oracle retail_predictive_application_server 15.0.3 - - cpe:2.3:a:oracle:retail_predictive_application_server:15.0.3:*:*:*:*:*:*:*
oracle retail_predictive_application_server 16.0.3 - - cpe:2.3:a:oracle:retail_predictive_application_server:16.0.3:*:*:*:*:*:*:*
oracle timesten_in-memory_database * - - cpe:2.3:a:oracle:timesten_in-memory_database:*:*:*:*:*:*:*:*
oracle weblogic_server 10.3.6.0.0 - - cpe:2.3:a:oracle:weblogic_server:10.3.6.0.0:*:*:*:*:*:*:*
oracle weblogic_server 12.1.3.0.0 - - cpe:2.3:a:oracle:weblogic_server:12.1.3.0.0:*:*:*:*:*:*:*
oracle weblogic_server 12.2.1.3.0 - - cpe:2.3:a:oracle:weblogic_server:12.2.1.3.0:*:*:*:*:*:*:*
oracle weblogic_server 12.2.1.4.0 - - cpe:2.3:a:oracle:weblogic_server:12.2.1.4.0:*:*:*:*:*:*:*
fujitsu m10-1_firmware * - - cpe:2.3:o:fujitsu:m10-1_firmware:*:*:*:*:*:*:*:*
fujitsu m10-4_firmware * - - cpe:2.3:o:fujitsu:m10-4_firmware:*:*:*:*:*:*:*:*
fujitsu m10-4s_firmware * - - cpe:2.3:o:fujitsu:m10-4s_firmware:*:*:*:*:*:*:*:*
fujitsu m12-1_firmware * - - cpe:2.3:o:fujitsu:m12-1_firmware:*:*:*:*:*:*:*:*
fujitsu m12-2_firmware * - - cpe:2.3:o:fujitsu:m12-2_firmware:*:*:*:*:*:*:*:*
fujitsu m12-2s_firmware * - - cpe:2.3:o:fujitsu:m12-2s_firmware:*:*:*:*:*:*:*:*
解决方案
中文解决方案:
(暂无数据)
英文解决方案:
(暂无数据)
临时解决方案:
(暂无数据)
参考链接
93841 vdb-entry
cve.org
访问
RHSA-2017:1659 vendor-advisory
cve.org
访问
RHSA-2017:1658 vendor-advisory
cve.org
访问
RHSA-2017:1801 vendor-advisory
cve.org
访问
RHSA-2017:0286 vendor-advisory
cve.org
访问
RHSA-2017:1413 vendor-advisory
cve.org
访问
RHSA-2017:2494 vendor-advisory
cve.org
访问
FreeBSD-SA-16:35 vendor-advisory
cve.org
访问
RHSA-2017:1414 vendor-advisory
cve.org
访问
[oss-security] 20161024 CVE-2016-8610: SSL Death Alert: OpenSSL SSL/TLS SSL3_AL_WARNING undefined alert Remote DoS mailing-list
cve.org
访问
RHSA-2017:0574 vendor-advisory
cve.org
访问
DSA-3773 vendor-advisory
cve.org
访问
RHSA-2017:1415 vendor-advisory
cve.org
访问
1037084 vdb-entry
cve.org
访问
RHSA-2017:1802 vendor-advisory
cve.org
访问
RHSA-2017:2493 vendor-advisory
cve.org
访问
无标题 x_refsource_MISC
cve.org
访问
无标题 x_refsource_MISC
cve.org
访问
无标题 x_refsource_MISC
cve.org
访问
无标题 x_refsource_MISC
cve.org
访问
无标题 x_refsource_MISC
cve.org
访问
无标题 x_refsource_CONFIRM
cve.org
访问
无标题 x_refsource_CONFIRM
cve.org
访问
无标题 x_refsource_CONFIRM
cve.org
访问
无标题 x_refsource_MISC
cve.org
访问
无标题 x_refsource_CONFIRM
cve.org
访问
无标题 x_refsource_CONFIRM
cve.org
访问
无标题 x_refsource_MISC
cve.org
访问
CVSS评分详情
7.5
HIGH
CVSS向量: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
CVSS版本: 3.1
机密性
NONE
完整性
NONE
可用性
HIGH
时间信息
发布时间:
2017-11-13 22:00:00
修改时间:
2024-08-06 02:27:40
创建时间:
2025-11-11 15:34:26
更新时间:
2025-11-11 15:52:45
利用信息
暂无可利用代码信息
数据源详情
数据源 记录ID 版本 提取时间
CVE cve_CVE-2016-8610 2025-11-11 15:19:12 2025-11-11 07:34:26
NVD nvd_CVE-2016-8610 2025-11-11 14:55:13 2025-11-11 07:43:06
CNNVD cnnvd_CNNVD-201610-726 2025-11-11 15:09:43 2025-11-11 07:52:45
版本与语言
当前版本: v3
主要语言: EN
支持语言:
EN ZH
安全公告
暂无安全公告信息
变更历史
v3 CNNVD
2025-11-11 15:52:45
vulnerability_type: 未提取 → 资源管理错误; cnnvd_id: 未提取 → CNNVD-201610-726; data_sources: ['cve', 'nvd'] → ['cnnvd', 'cve', 'nvd']
查看详细变更
  • vulnerability_type: 未提取 -> 资源管理错误
  • cnnvd_id: 未提取 -> CNNVD-201610-726
  • data_sources: ['cve', 'nvd'] -> ['cnnvd', 'cve', 'nvd']
v2 NVD
2025-11-11 15:43:06
severity: SeverityLevel.MEDIUM → SeverityLevel.HIGH; cvss_score: 未提取 → 7.5; cvss_vector: NOT_EXTRACTED → CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H; cvss_version: NOT_EXTRACTED → 3.1; affected_products_count: 4 → 74; data_sources: ['cve'] → ['cve', 'nvd']
查看详细变更
  • severity: SeverityLevel.MEDIUM -> SeverityLevel.HIGH
  • cvss_score: 未提取 -> 7.5
  • cvss_vector: NOT_EXTRACTED -> CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
  • cvss_version: NOT_EXTRACTED -> 3.1
  • affected_products_count: 4 -> 74
  • data_sources: ['cve'] -> ['cve', 'nvd']