Vulnerabilities
Vulnerable Software

Vulnerability Details CVE-2016-2842

The doapr_outch function in crypto/bio/b_print.c in OpenSSL 1.0.1 before 1.0.1s and 1.0.2 before 1.0.2g does not verify that a certain memory allocation succeeds, which allows remote attackers to cause a denial of service (out-of-bounds write or memory consumption) or possibly have unspecified other impact via a long string, as demonstrated by a large amount of ASN.1 data, a different vulnerability than CVE-2016-0799.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.659
EPSS Ranking 98.4%
CVSS Severity
CVSS v3 Score 9.8
CVSS v2 Score 10.0
References
Products affected by CVE-2016-2842
  • Openssl » Openssl » Version: 1.0.1
    cpe:2.3:a:openssl:openssl:1.0.1
  • Openssl » Openssl » Version: 1.0.1a
    cpe:2.3:a:openssl:openssl:1.0.1a
  • Openssl » Openssl » Version: 1.0.1b
    cpe:2.3:a:openssl:openssl:1.0.1b
  • Openssl » Openssl » Version: 1.0.1c
    cpe:2.3:a:openssl:openssl:1.0.1c
  • Openssl » Openssl » Version: 1.0.1d
    cpe:2.3:a:openssl:openssl:1.0.1d
  • Openssl » Openssl » Version: 1.0.1e
    cpe:2.3:a:openssl:openssl:1.0.1e
  • Openssl » Openssl » Version: 1.0.1f
    cpe:2.3:a:openssl:openssl:1.0.1f
  • Openssl » Openssl » Version: 1.0.1g
    cpe:2.3:a:openssl:openssl:1.0.1g
  • Openssl » Openssl » Version: 1.0.1h
    cpe:2.3:a:openssl:openssl:1.0.1h
  • Openssl » Openssl » Version: 1.0.1i
    cpe:2.3:a:openssl:openssl:1.0.1i
  • Openssl » Openssl » Version: 1.0.1j
    cpe:2.3:a:openssl:openssl:1.0.1j
  • Openssl » Openssl » Version: 1.0.1k
    cpe:2.3:a:openssl:openssl:1.0.1k
  • Openssl » Openssl » Version: 1.0.1l
    cpe:2.3:a:openssl:openssl:1.0.1l
  • Openssl » Openssl » Version: 1.0.1m
    cpe:2.3:a:openssl:openssl:1.0.1m
  • Openssl » Openssl » Version: 1.0.1n
    cpe:2.3:a:openssl:openssl:1.0.1n
  • Openssl » Openssl » Version: 1.0.1o
    cpe:2.3:a:openssl:openssl:1.0.1o
  • Openssl » Openssl » Version: 1.0.1p
    cpe:2.3:a:openssl:openssl:1.0.1p
  • Openssl » Openssl » Version: 1.0.1q
    cpe:2.3:a:openssl:openssl:1.0.1q
  • Openssl » Openssl » Version: 1.0.1r
    cpe:2.3:a:openssl:openssl:1.0.1r
  • Openssl » Openssl » Version: 1.0.2
    cpe:2.3:a:openssl:openssl:1.0.2
  • Openssl » Openssl » Version: 1.0.2a
    cpe:2.3:a:openssl:openssl:1.0.2a
  • Openssl » Openssl » Version: 1.0.2b
    cpe:2.3:a:openssl:openssl:1.0.2b
  • Openssl » Openssl » Version: 1.0.2c
    cpe:2.3:a:openssl:openssl:1.0.2c
  • Openssl » Openssl » Version: 1.0.2d
    cpe:2.3:a:openssl:openssl:1.0.2d
  • Openssl » Openssl » Version: 1.0.2e
    cpe:2.3:a:openssl:openssl:1.0.2e
  • Openssl » Openssl » Version: 1.0.2f
    cpe:2.3:a:openssl:openssl:1.0.2f


Contact Us

Shodan ® - All rights reserved