CVE-2016-8610

Source
https://cve.org/CVERecord?id=CVE-2016-8610
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2016-8610.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2016-8610
Downstream
Related
Published
2017-11-13T22:29:00.203Z
Modified
2026-04-16T01:38:18.601530850Z
Severity
  • 7.5 (High) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H CVSS Calculator
Summary
[none]
Details

A denial of service flaw was found in OpenSSL 0.9.8, 1.0.1, 1.0.2 through 1.0.2h, and 1.1.0 in the way the TLS/SSL protocol defined processing of ALERT packets during a connection handshake. A remote attacker could use this flaw to make a TLS/SSL server consume an excessive amount of CPU and fail to accept connections from other clients.

Database specific
{
    "unresolved_ranges": [
        {
            "cpe": "cpe:2.3:a:netapp:e-series_santricity_os_controller:*:*:*:*:*:*:*:*",
            "source": "CPE_FIELD",
            "extracted_events": [
                {
                    "introduced": "11.0"
                },
                {
                    "last_affected": "11.40"
                }
            ]
        },
        {
            "cpe": "cpe:2.3:a:oracle:adaptive_access_manager:11.1.2.3.0:*:*:*:*:*:*:*",
            "source": "CPE_FIELD",
            "extracted_events": [
                {
                    "last_affected": "11.1.2.3.0"
                }
            ]
        },
        {
            "cpe": "cpe:2.3:a:oracle:application_testing_suite:13.3.0.1:*:*:*:*:*:*:*",
            "source": "CPE_FIELD",
            "extracted_events": [
                {
                    "last_affected": "13.3.0.1"
                }
            ]
        },
        {
            "cpe": "cpe:2.3:a:oracle:communications_analytics:12.1.1:*:*:*:*:*:*:*",
            "source": "CPE_FIELD",
            "extracted_events": [
                {
                    "last_affected": "12.1.1"
                }
            ]
        },
        {
            "cpe": "cpe:2.3:a:oracle:communications_ip_service_activator:7.3.4:*:*:*:*:*:*:*",
            "source": "CPE_FIELD",
            "extracted_events": [
                {
                    "last_affected": "7.3.4"
                }
            ]
        },
        {
            "cpe": "cpe:2.3:a:oracle:communications_ip_service_activator:7.4.0:*:*:*:*:*:*:*",
            "source": "CPE_FIELD",
            "extracted_events": [
                {
                    "last_affected": "7.4.0"
                }
            ]
        },
        {
            "cpe": "cpe:2.3:a:oracle:core_rdbms:11.2.0.4:*:*:*:*:*:*:*",
            "source": "CPE_FIELD",
            "extracted_events": [
                {
                    "last_affected": "11.2.0.4"
                }
            ]
        },
        {
            "cpe": "cpe:2.3:a:oracle:core_rdbms:12.1.0.2:*:*:*:*:*:*:*",
            "source": "CPE_FIELD",
            "extracted_events": [
                {
                    "last_affected": "12.1.0.2"
                }
            ]
        },
        {
            "cpe": "cpe:2.3:a:oracle:core_rdbms:12.2.0.1:*:*:*:*:*:*:*",
            "source": "CPE_FIELD",
            "extracted_events": [
                {
                    "last_affected": "12.2.0.1"
                }
            ]
        },
        {
            "cpe": "cpe:2.3:a:oracle:core_rdbms:18c:*:*:*:*:*:*:*",
            "source": "CPE_FIELD",
            "extracted_events": [
                {
                    "last_affected": "18c"
                }
            ]
        },
        {
            "cpe": "cpe:2.3:a:oracle:core_rdbms:19c:*:*:*:*:*:*:*",
            "source": "CPE_FIELD",
            "extracted_events": [
                {
                    "last_affected": "19c"
                }
            ]
        },
        {
            "cpe": "cpe:2.3:a:oracle:enterprise_manager_ops_center:12.3.3:*:*:*:*:*:*:*",
            "source": "CPE_FIELD",
            "extracted_events": [
                {
                    "last_affected": "12.3.3"
                }
            ]
        },
        {
            "cpe": "cpe:2.3:a:oracle:enterprise_manager_ops_center:12.4.0:*:*:*:*:*:*:*",
            "source": "CPE_FIELD",
            "extracted_events": [
                {
                    "last_affected": "12.4.0"
                }
            ]
        },
        {
            "cpe": "cpe:2.3:a:oracle:goldengate_application_adapters:12.3.2.1.0:*:*:*:*:*:*:*",
            "source": "CPE_FIELD",
            "extracted_events": [
                {
                    "last_affected": "12.3.2.1.0"
                }
            ]
        },
        {
            "cpe": "cpe:2.3:a:oracle:jd_edwards_enterpriseone_tools:9.2:*:*:*:*:*:*:*",
            "source": "CPE_FIELD",
            "extracted_events": [
                {
                    "last_affected": "9.2"
                }
            ]
        },
        {
            "cpe": "cpe:2.3:a:oracle:peoplesoft_enterprise_peopletools:8.56:*:*:*:*:*:*:*",
            "source": "CPE_FIELD",
            "extracted_events": [
                {
                    "last_affected": "8.56"
                }
            ]
        },
        {
            "cpe": "cpe:2.3:a:oracle:peoplesoft_enterprise_peopletools:8.57:*:*:*:*:*:*:*",
            "source": "CPE_FIELD",
            "extracted_events": [
                {
                    "last_affected": "8.57"
                }
            ]
        },
        {
            "cpe": "cpe:2.3:a:oracle:peoplesoft_enterprise_peopletools:8.58:*:*:*:*:*:*:*",
            "source": "CPE_FIELD",
            "extracted_events": [
                {
                    "last_affected": "8.58"
                }
            ]
        },
        {
            "cpe": "cpe:2.3:a:oracle:retail_predictive_application_server:15.0.3:*:*:*:*:*:*:*",
            "source": "CPE_FIELD",
            "extracted_events": [
                {
                    "last_affected": "15.0.3"
                }
            ]
        },
        {
            "cpe": "cpe:2.3:a:oracle:retail_predictive_application_server:16.0.3:*:*:*:*:*:*:*",
            "source": "CPE_FIELD",
            "extracted_events": [
                {
                    "last_affected": "16.0.3"
                }
            ]
        },
        {
            "cpe": "cpe:2.3:a:oracle:timesten_in-memory_database:*:*:*:*:*:*:*:*",
            "source": "CPE_FIELD",
            "extracted_events": [
                {
                    "fixed": "18.1.4.1.0"
                }
            ]
        },
        {
            "cpe": "cpe:2.3:a:oracle:weblogic_server:10.3.6.0.0:*:*:*:*:*:*:*",
            "source": "CPE_FIELD",
            "extracted_events": [
                {
                    "last_affected": "10.3.6.0.0"
                }
            ]
        },
        {
            "cpe": "cpe:2.3:a:oracle:weblogic_server:12.1.3.0.0:*:*:*:*:*:*:*",
            "source": "CPE_FIELD",
            "extracted_events": [
                {
                    "last_affected": "12.1.3.0.0"
                }
            ]
        },
        {
            "cpe": "cpe:2.3:a:oracle:weblogic_server:12.2.1.3.0:*:*:*:*:*:*:*",
            "source": "CPE_FIELD",
            "extracted_events": [
                {
                    "last_affected": "12.2.1.3.0"
                }
            ]
        },
        {
            "cpe": "cpe:2.3:a:oracle:weblogic_server:12.2.1.4.0:*:*:*:*:*:*:*",
            "source": "CPE_FIELD",
            "extracted_events": [
                {
                    "last_affected": "12.2.1.4.0"
                }
            ]
        },
        {
            "cpe": "cpe:2.3:a:redhat:jboss_enterprise_application_platform:6.0.0:*:*:*:*:*:*:*",
            "source": "CPE_FIELD",
            "extracted_events": [
                {
                    "last_affected": "6.0.0"
                }
            ]
        },
        {
            "cpe": "cpe:2.3:a:redhat:jboss_enterprise_application_platform:6.4.0:*:*:*:*:*:*:*",
            "source": "CPE_FIELD",
            "extracted_events": [
                {
                    "last_affected": "6.4.0"
                }
            ]
        },
        {
            "cpe": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
            "source": "CPE_FIELD",
            "extracted_events": [
                {
                    "last_affected": "8.0"
                }
            ]
        },
        {
            "cpe": "cpe:2.3:o:fujitsu:m10-1_firmware:*:*:*:*:*:*:*:*",
            "source": "CPE_FIELD",
            "extracted_events": [
                {
                    "fixed": "xcp2361"
                },
                {
                    "introduced": "xcp3000"
                },
                {
                    "fixed": "xcp3070"
                }
            ]
        },
        {
            "cpe": "cpe:2.3:o:fujitsu:m10-4_firmware:*:*:*:*:*:*:*:*",
            "source": "CPE_FIELD",
            "extracted_events": [
                {
                    "fixed": "xcp2361"
                },
                {
                    "introduced": "xcp3000"
                },
                {
                    "fixed": "xcp3070"
                }
            ]
        },
        {
            "cpe": "cpe:2.3:o:fujitsu:m10-4s_firmware:*:*:*:*:*:*:*:*",
            "source": "CPE_FIELD",
            "extracted_events": [
                {
                    "fixed": "xcp2361"
                },
                {
                    "introduced": "xcp3000"
                },
                {
                    "fixed": "xcp3070"
                }
            ]
        },
        {
            "cpe": "cpe:2.3:o:fujitsu:m12-1_firmware:*:*:*:*:*:*:*:*",
            "source": "CPE_FIELD",
            "extracted_events": [
                {
                    "fixed": "xcp2361"
                },
                {
                    "introduced": "xcp3000"
                },
                {
                    "fixed": "xcp3070"
                }
            ]
        },
        {
            "cpe": "cpe:2.3:o:fujitsu:m12-2_firmware:*:*:*:*:*:*:*:*",
            "source": "CPE_FIELD",
            "extracted_events": [
                {
                    "fixed": "xcp2361"
                },
                {
                    "introduced": "xcp3000"
                },
                {
                    "fixed": "xcp3070"
                }
            ]
        },
        {
            "cpe": "cpe:2.3:o:fujitsu:m12-2s_firmware:*:*:*:*:*:*:*:*",
            "source": "CPE_FIELD",
            "extracted_events": [
                {
                    "fixed": "xcp2361"
                },
                {
                    "introduced": "xcp3000"
                },
                {
                    "fixed": "xcp3070"
                }
            ]
        },
        {
            "cpe": "cpe:2.3:o:paloaltonetworks:pan-os:*:*:*:*:*:*:*:*",
            "source": "CPE_FIELD",
            "extracted_events": [
                {
                    "last_affected": "6.1.17"
                },
                {
                    "introduced": "7.0.0"
                },
                {
                    "last_affected": "7.0.15"
                },
                {
                    "introduced": "7.1.0"
                },
                {
                    "last_affected": "7.1.10"
                }
            ]
        },
        {
            "cpe": "cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*",
            "source": "CPE_FIELD",
            "extracted_events": [
                {
                    "last_affected": "6.0"
                }
            ]
        },
        {
            "cpe": "cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*",
            "source": "CPE_FIELD",
            "extracted_events": [
                {
                    "last_affected": "7.0"
                }
            ]
        },
        {
            "cpe": "cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*",
            "source": "CPE_FIELD",
            "extracted_events": [
                {
                    "last_affected": "6.0"
                }
            ]
        },
        {
            "cpe": "cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*",
            "source": "CPE_FIELD",
            "extracted_events": [
                {
                    "last_affected": "7.0"
                }
            ]
        },
        {
            "cpe": "cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*",
            "source": "CPE_FIELD",
            "extracted_events": [
                {
                    "last_affected": "7.3"
                }
            ]
        },
        {
            "cpe": "cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*",
            "source": "CPE_FIELD",
            "extracted_events": [
                {
                    "last_affected": "7.4"
                }
            ]
        },
        {
            "cpe": "cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*",
            "source": "CPE_FIELD",
            "extracted_events": [
                {
                    "last_affected": "7.6"
                }
            ]
        },
        {
            "cpe": "cpe:2.3:o:redhat:enterprise_linux_server_eus:7.3:*:*:*:*:*:*:*",
            "source": "CPE_FIELD",
            "extracted_events": [
                {
                    "last_affected": "7.3"
                }
            ]
        },
        {
            "cpe": "cpe:2.3:o:redhat:enterprise_linux_server_eus:7.4:*:*:*:*:*:*:*",
            "source": "CPE_FIELD",
            "extracted_events": [
                {
                    "last_affected": "7.4"
                }
            ]
        },
        {
            "cpe": "cpe:2.3:o:redhat:enterprise_linux_server_eus:7.5:*:*:*:*:*:*:*",
            "source": "CPE_FIELD",
            "extracted_events": [
                {
                    "last_affected": "7.5"
                }
            ]
        },
        {
            "cpe": "cpe:2.3:o:redhat:enterprise_linux_server_eus:7.6:*:*:*:*:*:*:*",
            "source": "CPE_FIELD",
            "extracted_events": [
                {
                    "last_affected": "7.6"
                }
            ]
        },
        {
            "cpe": "cpe:2.3:o:redhat:enterprise_linux_server_tus:7.3:*:*:*:*:*:*:*",
            "source": "CPE_FIELD",
            "extracted_events": [
                {
                    "last_affected": "7.3"
                }
            ]
        },
        {
            "cpe": "cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*",
            "source": "CPE_FIELD",
            "extracted_events": [
                {
                    "last_affected": "7.6"
                }
            ]
        },
        {
            "cpe": "cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*",
            "source": "CPE_FIELD",
            "extracted_events": [
                {
                    "last_affected": "6.0"
                }
            ]
        },
        {
            "cpe": "cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*",
            "source": "CPE_FIELD",
            "extracted_events": [
                {
                    "last_affected": "7.0"
                }
            ]
        }
    ]
}
References

Affected packages

Git / github.com/openssl/openssl

Affected ranges

Type
GIT
Repo
https://github.com/openssl/openssl
Events
Introduced
Last affected
Introduced
0 Unknown introduced commit / All previous commits are affected
Last affected
Last affected
Last affected
Database specific
{
    "cpe": [
        "cpe:2.3:a:openssl:openssl:*:*:*:*:*:*:*:*",
        "cpe:2.3:a:openssl:openssl:0.9.8:*:*:*:*:*:*:*",
        "cpe:2.3:a:openssl:openssl:1.0.1:*:*:*:*:*:*:*",
        "cpe:2.3:a:openssl:openssl:1.1.0:*:*:*:*:*:*:*"
    ],
    "source": "CPE_FIELD",
    "extracted_events": [
        {
            "introduced": "1.0.2"
        },
        {
            "last_affected": "1.0.2h"
        },
        {
            "introduced": "0"
        },
        {
            "last_affected": "0.9.8"
        },
        {
            "last_affected": "1.0.1"
        },
        {
            "last_affected": "1.1.0"
        }
    ]
}

Affected versions

Other
BEFORE_engine
OpenSSL_0_9_1c
OpenSSL_0_9_2b
OpenSSL_0_9_3
OpenSSL_0_9_3a
OpenSSL_0_9_3beta2
OpenSSL_0_9_4
OpenSSL_0_9_5a
OpenSSL_0_9_5a-beta1
OpenSSL_0_9_5a-beta2
OpenSSL_0_9_5beta1
OpenSSL_0_9_5beta2
OpenSSL_0_9_6-beta3
OpenSSL_0_9_8
OpenSSL_0_9_8-beta1
OpenSSL_0_9_8-beta2
OpenSSL_0_9_8-beta4
OpenSSL_0_9_8-beta5
OpenSSL_0_9_8-beta6
OpenSSL_0_9_8-post-auto-reformat
OpenSSL_0_9_8-post-reformat
OpenSSL_0_9_8-pre-auto-reformat
OpenSSL_0_9_8-pre-reformat
OpenSSL_0_9_8a
OpenSSL_0_9_8b
OpenSSL_0_9_8c
OpenSSL_0_9_8d
OpenSSL_0_9_8e
OpenSSL_0_9_8h
OpenSSL_0_9_8i
OpenSSL_0_9_8j
OpenSSL_0_9_8m
OpenSSL_0_9_8m-beta1
OpenSSL_0_9_8n
OpenSSL_0_9_8o
OpenSSL_0_9_8p
OpenSSL_0_9_8q
OpenSSL_0_9_8r
OpenSSL_0_9_8s
OpenSSL_0_9_8t
OpenSSL_0_9_8u
OpenSSL_0_9_8v
OpenSSL_0_9_8w
OpenSSL_0_9_8x
OpenSSL_0_9_8y
OpenSSL_0_9_8za
OpenSSL_0_9_8zb
OpenSSL_0_9_8zc
OpenSSL_0_9_8zd
OpenSSL_0_9_8ze
OpenSSL_0_9_8zf
OpenSSL_0_9_8zg
OpenSSL_0_9_8zh
OpenSSL_1_0_1
OpenSSL_1_0_1-beta1
OpenSSL_1_0_1-beta2
OpenSSL_1_0_1-beta3
OpenSSL_1_0_1-post-auto-reformat
OpenSSL_1_0_1-post-reformat
OpenSSL_1_0_1-pre-auto-reformat
OpenSSL_1_0_1-pre-reformat
OpenSSL_1_0_1a
OpenSSL_1_0_1b
OpenSSL_1_0_1c
OpenSSL_1_0_1d
OpenSSL_1_0_1e
OpenSSL_1_0_1f
OpenSSL_1_0_1g
OpenSSL_1_0_1h
OpenSSL_1_0_1i
OpenSSL_1_0_1j
OpenSSL_1_0_1k
OpenSSL_1_0_1l
OpenSSL_1_0_1m
OpenSSL_1_0_1n
OpenSSL_1_0_1o
OpenSSL_1_0_1p
OpenSSL_1_0_1q
OpenSSL_1_0_1r
OpenSSL_1_0_1s
OpenSSL_1_0_1t
OpenSSL_1_0_1u
OpenSSL_1_0_2u
OpenSSL_1_1_0
OpenSSL_1_1_0-pre1
OpenSSL_1_1_0-pre2
OpenSSL_1_1_0-pre3
OpenSSL_1_1_0-pre4
OpenSSL_1_1_0-pre5
OpenSSL_1_1_0-pre6
OpenSSL_1_1_0a
OpenSSL_1_1_0b
OpenSSL_1_1_0c
OpenSSL_1_1_0d
OpenSSL_1_1_0e
OpenSSL_1_1_0f
OpenSSL_1_1_0g
OpenSSL_1_1_0h
OpenSSL_1_1_0i
OpenSSL_1_1_0j
OpenSSL_1_1_0k
OpenSSL_1_1_0l
master-post-auto-reformat
master-post-reformat
master-pre-auto-reformat
master-pre-reformat

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2016-8610.json"