Vulnerabilities
Vulnerable Software

Vulnerability Details CVE-2016-0798

Memory leak in the SRP_VBASE_get_by_user implementation in OpenSSL 1.0.1 before 1.0.1s and 1.0.2 before 1.0.2g allows remote attackers to cause a denial of service (memory consumption) by providing an invalid username in a connection attempt, related to apps/s_server.c and crypto/srp/srp_vfy.c.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.235
EPSS Ranking 95.7%
CVSS Severity
CVSS v3 Score 7.5
CVSS v2 Score 7.8
References
Products affected by CVE-2016-0798
  • Openssl » Openssl » Version: 1.0.1
    cpe:2.3:a:openssl:openssl:1.0.1
  • Openssl » Openssl » Version: 1.0.1a
    cpe:2.3:a:openssl:openssl:1.0.1a
  • Openssl » Openssl » Version: 1.0.1b
    cpe:2.3:a:openssl:openssl:1.0.1b
  • Openssl » Openssl » Version: 1.0.1c
    cpe:2.3:a:openssl:openssl:1.0.1c
  • Openssl » Openssl » Version: 1.0.1d
    cpe:2.3:a:openssl:openssl:1.0.1d
  • Openssl » Openssl » Version: 1.0.1e
    cpe:2.3:a:openssl:openssl:1.0.1e
  • Openssl » Openssl » Version: 1.0.1f
    cpe:2.3:a:openssl:openssl:1.0.1f
  • Openssl » Openssl » Version: 1.0.1g
    cpe:2.3:a:openssl:openssl:1.0.1g
  • Openssl » Openssl » Version: 1.0.1h
    cpe:2.3:a:openssl:openssl:1.0.1h
  • Openssl » Openssl » Version: 1.0.1i
    cpe:2.3:a:openssl:openssl:1.0.1i
  • Openssl » Openssl » Version: 1.0.1j
    cpe:2.3:a:openssl:openssl:1.0.1j
  • Openssl » Openssl » Version: 1.0.1k
    cpe:2.3:a:openssl:openssl:1.0.1k
  • Openssl » Openssl » Version: 1.0.1l
    cpe:2.3:a:openssl:openssl:1.0.1l
  • Openssl » Openssl » Version: 1.0.1m
    cpe:2.3:a:openssl:openssl:1.0.1m
  • Openssl » Openssl » Version: 1.0.1n
    cpe:2.3:a:openssl:openssl:1.0.1n
  • Openssl » Openssl » Version: 1.0.1o
    cpe:2.3:a:openssl:openssl:1.0.1o
  • Openssl » Openssl » Version: 1.0.1p
    cpe:2.3:a:openssl:openssl:1.0.1p
  • Openssl » Openssl » Version: 1.0.1q
    cpe:2.3:a:openssl:openssl:1.0.1q
  • Openssl » Openssl » Version: 1.0.1r
    cpe:2.3:a:openssl:openssl:1.0.1r
  • Openssl » Openssl » Version: 1.0.2
    cpe:2.3:a:openssl:openssl:1.0.2
  • Openssl » Openssl » Version: 1.0.2a
    cpe:2.3:a:openssl:openssl:1.0.2a
  • Openssl » Openssl » Version: 1.0.2b
    cpe:2.3:a:openssl:openssl:1.0.2b
  • Openssl » Openssl » Version: 1.0.2c
    cpe:2.3:a:openssl:openssl:1.0.2c
  • Openssl » Openssl » Version: 1.0.2d
    cpe:2.3:a:openssl:openssl:1.0.2d
  • Openssl » Openssl » Version: 1.0.2e
    cpe:2.3:a:openssl:openssl:1.0.2e
  • Openssl » Openssl » Version: 1.0.2f
    cpe:2.3:a:openssl:openssl:1.0.2f


Contact Us

Shodan ® - All rights reserved