Vulnerability Name:

CVE-2016-2842 (CCN-111304)

Assigned:2016-03-01
Published:2016-03-01
Updated:2018-01-05
Summary:The doapr_outch function in crypto/bio/b_print.c in OpenSSL 1.0.1 before 1.0.1s and 1.0.2 before 1.0.2g does not verify that a certain memory allocation succeeds, which allows remote attackers to cause a denial of service (out-of-bounds write or memory consumption) or possibly have unspecified other impact via a long string, as demonstrated by a large amount of ASN.1 data, a different vulnerability than CVE-2016-0799.
CVSS v3 Severity:9.8 Critical (CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H)
8.5 High (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): High
Integrity (I): High
Availibility (A): High
7.5 High (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H)
6.5 Medium (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): None
Integrity (I): None
Availibility (A): High
CVSS v2 Severity:10.0 High (CVSS v2 Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Authentication (Au): None
Impact Metrics:Confidentiality (C): Complete
Integrity (I): Complete
Availibility (A): Complete
7.8 High (CCN CVSS v2 Vector: AV:N/AC:L/Au:N/C:N/I:N/A:C)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Athentication (Au): None
Impact Metrics:Confidentiality (C): None
Integrity (I): None
Availibility (A): Complete
5.8 Medium (REDHAT CVSS v2 Vector: AV:N/AC:M/Au:N/C:N/I:P/A:P)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Medium
Authentication (Au): None
Impact Metrics:Confidentiality (C): None
Integrity (I): Partial
Availibility (A): Partial
Vulnerability Type:CWE-119
CWE-787
Vulnerability Consequences:Denial of Service
References:Source: MITRE
Type: CNA
CVE-2016-2842

Source: HP
Type: UNKNOWN
HPSBGN03569

Source: HP
Type: UNKNOWN
HPSBMU03575

Source: CONFIRM
Type: Vendor Advisory
http://openssl.org/news/secadv/20160301.txt

Source: CCN
Type: RHSA-2016-0722
Important: openssl security update

Source: REDHAT
Type: UNKNOWN
RHSA-2016:0722

Source: CCN
Type: RHSA-2016-0996
Important: openssl security update

Source: REDHAT
Type: UNKNOWN
RHSA-2016:0996

Source: CCN
Type: RHSA-2016-2073
Important: openssl security update

Source: REDHAT
Type: UNKNOWN
RHSA-2016:2073

Source: CCN
Type: RHSA-2016-2957
Important: Red Hat JBoss Core Services Apache HTTP 2.4.23 Release

Source: REDHAT
Type: UNKNOWN
RHSA-2016:2957

Source: CCN
Type: IBM Security Bulletin T1023779 (PowerKVM)
Multiple vulnerabilities in OpenSSL affect PowerKVM

Source: CCN
Type: IBM Security Bulletin T1023631 (General Parallel File System)
Vulnerability in OpenSSL affects IBM GPFS V3.5 (CVE-2016-2842)

Source: CCN
Type: IBM Security Bulletin T1023779 (PowerKVM)
Multiple vulnerabilities in OpenSSL affect PowerKVM

Source: CCN
Type: IBM Security Bulletin T1024066 (Cloud Manager with Openstack)
Vulnerabilities in OpenSSL affect IBM Cloud Manager with OpenStack

Source: CCN
Type: IBM Security Bulletin T1024067 (SmartCloud Entry)
Vulnerabilities in OpenSSL affect IBM SmartCloud Entry

Source: CCN
Type: IBM Security Bulletin T1024319 (Flex System Manager Node)
IBM Flex System Manager (FSM) is affected by multiple openssl vulnerabilities

Source: CCN
Type: IBM Security Bulletin N1021156 (i)
Multiple vulnerabilities in OpenSSL affect IBM i

Source: CCN
Type: IBM Security Bulletin S1009631 (SAN512B-6 Director (8961-F08))
Multiple vulnerabilities in OpenSSL affect IBM b-type SAN switches and directors and IBM Network Advisor (CVE-2016-0705, CVE-2016-0797, CVE-2016-0799, CVE-2016-0702, CVE-2016-0704, CVE-2016-0704, CVE-2016-2842).

Source: CCN
Type: IBM Security Bulletin S1009663 (Cisco MDS 9148S 16G Multilayer Fabric Switch)
Multiple vulnerabilities in OpenSSL affect IBM Cisco Switches and Directors.

Source: CCN
Type: IBM Security Bulletin S1010841 (Data ONTAP)
March 2016 OpenSSL Vulnerabilities affect Multiple N series Products

Source: CCN
Type: IBM Security Bulletin 1979086 (Tivoli Netcool/Reporter)
Multiple vulnerabilities in OpenSSL affect IBM Tivoli Netcool/Reporter

Source: CCN
Type: IBM Security Bulletin 1980927 (PureData System for Analytics)
Vulnerability in OpenSSL affects IBM Netezza Host Management (CVE-2016-2842)

Source: CCN
Type: IBM Security Bulletin 1980965 (PureData System for Analytics)
Multiple vulnerabilities in MD5 Signature and Hash Algorithm, glibc and OpenSSL affect IBM Netezza Firmware Diagnostics Tools

Source: CCN
Type: IBM Security Bulletin 1981545 (InfoSphere Information Server)
Multiple vulnerabilities in OpenSSL affect IBM InfoSphere Information Server

Source: CCN
Type: IBM Security Bulletin 1982159 (Tivoli Provisioning Manager for OS Deployment)
Vulnerability in OpenSSL affects Tivoli Provisioning Manager for OS Deployment, Tivoli Provisioning Manager for Images (CVE-2016-2842)

Source: CCN
Type: IBM Security Bulletin 1982172 (Integration Bus)
Multiple vulnerabilities in OpenSSL affect WebSphere Message Broker and IBM Integration Bus

Source: CCN
Type: IBM Security Bulletin 1982289 (PredictiveInsight)
Multiple vulnerabilities in OpenSSL affect IBM Predictive Insight

Source: CCN
Type: IBM Security Bulletin 1982291 (Campaign)
Multiple vulnerabilities in OpenSSL affect IBM Campaign, IBM Contact Optimization

Source: CCN
Type: IBM Security Bulletin 1982346 (Security Network Controller)
Multiple vulnerabilities in OpenSSL affect IBM Security Network Controller

Source: CCN
Type: IBM Security Bulletin 1982350 (Security Network Active Bypass)
Multiple vulnerabilities in OpenSSL affect IBM Security Active Bypass

Source: CCN
Type: IBM Security Bulletin 1982353 (InfoSphere Master Data Management)
Security Bulletin: Vulnerability in OpenSSL affects IBM InfoSphere Master Data Management (CVE-2016-2842)

Source: CCN
Type: IBM Security Bulletin 1982374 (Sterling Connect:Express for UNIX)
Vulnerability in OpenSSL affects IBM Sterling Connect:Express for Unix (CVE-2016-2842).

Source: CCN
Type: IBM Security Bulletin 1983416 (Tealeaf Customer Experience)
Multiple security issues in IBM Tealeaf Customer Experience on Cloud Network Capture Add-On

Source: CCN
Type: IBM Security Bulletin 1983509 (BigFix family)
Multiple Vulnerabilities in OpenSSL affects IBM BigFix Remote Control and IBM Endpoint Manager for Remote Control (CVE-2016-2842)

Source: CCN
Type: IBM Security Bulletin 1984583 (Security Network Protection)
Multiple vulnerabilities in OpenSSL affect IBM Security Network Protection

Source: CCN
Type: IBM Security Bulletin 1985736 (Security Identity Manager)
Fixes for Multiple Security Vulnerabilities in IBM Security Identity Manager Virtual Appliance available

Source: CCN
Type: IBM Security Bulletin 1986152 (Security Identity Governance and Intelligence)
Multiple vulnerabilities in OpenSSL affect IBM Security Identity Governance

Source: CCN
Type: IBM Security Bulletin 1986260 (Security Privileged Identity Manager)
Multiple Security Vulnerabilities fixed in IBM Security Privileged Identity Manager

Source: CCN
Type: IBM Security Bulletin 1986697 (DataPower Gateways)
Multiple vulnerabilities in SSL affect IBM DataPower Gateways

Source: CCN
Type: IBM Security Bulletin 1987174 (Cognos TM1)
Multiple Security Vulnerabilities exist in IBM Cognos TM1

Source: CCN
Type: IBM Security Bulletin 1987175 (Cognos Insight)
Multiple Security Vulnerabilities exist in IBM Cognos Insight

Source: CCN
Type: IBM Security Bulletin 1987779 (Security QRadar SIEM)
OpenSSL as used in IBM QRadar SIEM is vulnerable to multiple CVE's.

Source: CCN
Type: IBM Security Bulletin 1987887 (Workload Deployer)
Multiple vulnerabilities in OpenSSL affect IBM Workload Deployer.

Source: CCN
Type: IBM Security Bulletin 1987903 (Security Access Manager for Web)
IBM Security Access Manager for Web is affected by vulnerabilities in OpenSSL

Source: CCN
Type: IBM Security Bulletin 1988189 (Security Access Manager for Mobile)
IBM Security Access Manager for Mobile is affected by vulnerabilities in OpenSSL

Source: CCN
Type: IBM Security Bulletin 1992517 (Cognos Express)
Multiple Security Vulnerabilities exist in IBM Cognos Express.

Source: CCN
Type: IBM Security Bulletin 2003620 (Spectrum Protect for Virtual Environments)
Multiple Vulnerabilities in OpenSSL affect IBM Spectrum Protect (formerly Tivoli Storage Manager) Client and IBM Spectrum Protect (formerly Tivoli Storage Manager) for Virtual Environments: Data Protection for VMware

Source: CONFIRM
Type: UNKNOWN
http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html

Source: BID
Type: UNKNOWN
84169

Source: CCN
Type: BID-84169
OpenSSL 'crypto/bio/b_print.c' Denial of Service Vulnerability

Source: XF
Type: UNKNOWN
openssl-cve20162842-dos(111304)

Source: CONFIRM
Type: Vendor Advisory
https://git.openssl.org/?p=openssl.git;a=commit;h=578b956fe741bf8e84055547b1e83c28dd902c73

Source: CONFIRM
Type: UNKNOWN
https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03741en_us

Source: CONFIRM
Type: UNKNOWN
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05068681

Source: CONFIRM
Type: UNKNOWN
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05086877

Source: CONFIRM
Type: UNKNOWN
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05111017

Source: CONFIRM
Type: UNKNOWN
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05126404

Source: CONFIRM
Type: UNKNOWN
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05131085

Source: CONFIRM
Type: UNKNOWN
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05135617

Source: CONFIRM
Type: UNKNOWN
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05141441

Source: CONFIRM
Type: UNKNOWN
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05150736

Source: CONFIRM
Type: UNKNOWN
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05150800

Source: CONFIRM
Type: UNKNOWN
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05150888

Source: CONFIRM
Type: UNKNOWN
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05157667

Source: CONFIRM
Type: UNKNOWN
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05158380

Source: CONFIRM
Type: UNKNOWN
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05376917

Source: CONFIRM
Type: UNKNOWN
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722

Source: CONFIRM
Type: UNKNOWN
https://kc.mcafee.com/corporate/index?page=content&id=SB10152

Source: CONFIRM
Type: UNKNOWN
https://security.netapp.com/advisory/ntap-20160321-0001/

Source: CCN
Type: IBM Security Bulletin 5099490 (Integrated Management Module II (IMM2) for System x and Flex Systems)
Vulnerability in openssl affects IBM Integrated Management Module II (IMM2) for System x, Flex and BladeCenter systems

Source: CCN
Type: OpenSSL Security Advisory [1st March 2016]
OpenSSL Security Advisory

Source: CCN
Type: WhiteSource Vulnerability Database
CVE-2016-2842

Vulnerable Configuration:Configuration 1:
  • cpe:/a:openssl:openssl:1.0.1:*:*:*:*:*:*:*
  • OR cpe:/a:openssl:openssl:1.0.1:beta1:*:*:*:*:*:*
  • OR cpe:/a:openssl:openssl:1.0.1:beta2:*:*:*:*:*:*
  • OR cpe:/a:openssl:openssl:1.0.1:beta3:*:*:*:*:*:*
  • OR cpe:/a:openssl:openssl:1.0.1a:*:*:*:*:*:*:*
  • OR cpe:/a:openssl:openssl:1.0.1b:*:*:*:*:*:*:*
  • OR cpe:/a:openssl:openssl:1.0.1c:*:*:*:*:*:*:*
  • OR cpe:/a:openssl:openssl:1.0.1d:*:*:*:*:*:*:*
  • OR cpe:/a:openssl:openssl:1.0.1e:*:*:*:*:*:*:*
  • OR cpe:/a:openssl:openssl:1.0.1f:*:*:*:*:*:*:*
  • OR cpe:/a:openssl:openssl:1.0.1g:*:*:*:*:*:*:*
  • OR cpe:/a:openssl:openssl:1.0.1h:*:*:*:*:*:*:*
  • OR cpe:/a:openssl:openssl:1.0.1i:*:*:*:*:*:*:*
  • OR cpe:/a:openssl:openssl:1.0.1j:*:*:*:*:*:*:*
  • OR cpe:/a:openssl:openssl:1.0.1k:*:*:*:*:*:*:*
  • OR cpe:/a:openssl:openssl:1.0.1l:*:*:*:*:*:*:*
  • OR cpe:/a:openssl:openssl:1.0.1m:*:*:*:*:*:*:*
  • OR cpe:/a:openssl:openssl:1.0.1n:*:*:*:*:*:*:*
  • OR cpe:/a:openssl:openssl:1.0.1o:*:*:*:*:*:*:*
  • OR cpe:/a:openssl:openssl:1.0.1p:*:*:*:*:*:*:*
  • OR cpe:/a:openssl:openssl:1.0.1q:*:*:*:*:*:*:*
  • OR cpe:/a:openssl:openssl:1.0.1r:*:*:*:*:*:*:*
  • OR cpe:/a:openssl:openssl:1.0.2:*:*:*:*:*:*:*
  • OR cpe:/a:openssl:openssl:1.0.2:beta1:*:*:*:*:*:*
  • OR cpe:/a:openssl:openssl:1.0.2:beta2:*:*:*:*:*:*
  • OR cpe:/a:openssl:openssl:1.0.2:beta3:*:*:*:*:*:*
  • OR cpe:/a:openssl:openssl:1.0.2a:*:*:*:*:*:*:*
  • OR cpe:/a:openssl:openssl:1.0.2b:*:*:*:*:*:*:*
  • OR cpe:/a:openssl:openssl:1.0.2c:*:*:*:*:*:*:*
  • OR cpe:/a:openssl:openssl:1.0.2d:*:*:*:*:*:*:*
  • OR cpe:/a:openssl:openssl:1.0.2e:*:*:*:*:*:*:*
  • OR cpe:/a:openssl:openssl:1.0.2f:*:*:*:*:*:*:*

  • Configuration RedHat 1:
  • cpe:/o:redhat:enterprise_linux:7:*:*:*:*:*:*:*

  • Configuration RedHat 2:
  • cpe:/o:redhat:enterprise_linux:7::client:*:*:*:*:*

  • Configuration RedHat 3:
  • cpe:/o:redhat:enterprise_linux:7::computenode:*:*:*:*:*

  • Configuration RedHat 4:
  • cpe:/o:redhat:enterprise_linux:7::server:*:*:*:*:*

  • Configuration RedHat 5:
  • cpe:/o:redhat:enterprise_linux:7::workstation:*:*:*:*:*

  • Configuration RedHat 6:
  • cpe:/o:redhat:enterprise_linux:6:*:*:*:*:*:*:*

  • Configuration RedHat 7:
  • cpe:/o:redhat:enterprise_linux:6::client:*:*:*:*:*

  • Configuration RedHat 8:
  • cpe:/o:redhat:enterprise_linux:6::computenode:*:*:*:*:*

  • Configuration RedHat 9:
  • cpe:/o:redhat:enterprise_linux:6::server:*:*:*:*:*

  • Configuration RedHat 10:
  • cpe:/o:redhat:enterprise_linux:6::workstation:*:*:*:*:*

  • Configuration CCN 1:
  • cpe:/a:openssl:openssl:1.0.2:*:*:*:*:*:*:*
  • OR cpe:/a:openssl:openssl:1.0.1:*:*:*:*:*:*:*
  • OR cpe:/h:cisco:telepresence_system_500-32:-:*:*:*:*:*:*:*
  • OR cpe:/h:cisco:telepresence_system_500-37:-:*:*:*:*:*:*:*
  • AND
  • cpe:/a:ibm:tivoli_netcool/reporter:2.2:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:infosphere_information_server:8.5:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:infosphere_master_data_management:10.1:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:infosphere_information_server:8.7:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:cognos_tm1:10.1.0:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:infosphere_information_server:9.1:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:infosphere_master_data_management:10.0:*:*:*:collaborative:*:*:*
  • OR cpe:/a:ibm:qradar_security_information_and_event_manager:7.1:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:cognos_express:10.1:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:infosphere_master_data_management:11.0:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:integration_bus:9.0:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:tivoli_provisioning_manager:5.1.1:*:*:*:os_deployment:*:*:*
  • OR cpe:/a:ibm:campaign:8.6:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:campaign:9.0:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:campaign:9.1:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:qradar_security_information_and_event_manager:7.2:*:*:*:*:*:*:*
  • OR cpe:/o:ibm:security_access_manager:7.0:*:web:*:*:*:*:*
  • OR cpe:/a:ibm:cognos_express:10.2.1:*:*:*:*:*:*:*
  • OR cpe:/o:ibm:security_access_manager:8.0:*:web:*:*:*:*:*
  • OR cpe:/o:ibm:security_access_manager:8.0:*:mobile:*:*:*:*:*
  • OR cpe:/a:ibm:cognos_tm1:10.2.2:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:smartcloud_entry:3.2:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:tivoli_provisioning_manager:7.1.1:*:*:*:os_deployment:*:*:*
  • OR cpe:/o:ibm:security_access_manager:8.0.0.1:*:mobile:*:*:*:*:*
  • OR cpe:/o:ibm:security_access_manager:8.0.0.2:*:mobile:*:*:*:*:*
  • OR cpe:/o:ibm:security_access_manager:8.0.0.3:*:mobile:*:*:*:*:*
  • OR cpe:/o:ibm:security_access_manager:8.0.0.4:*:mobile:*:*:*:*:*
  • OR cpe:/a:ibm:tealeaf_customer_experience:16.1.01:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:infosphere_information_server:11.3:*:*:*:*:*:*:*
  • OR cpe:/o:ibm:i:7.1:*:*:*:*:*:*:*
  • OR cpe:/o:ibm:i:7.2:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:cognos_insight:10.2:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:cognos_insight:10.2.1:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:cognos_insight:10.2.2:*:*:*:*:*:*:*
  • OR cpe:/o:ibm:security_access_manager:8.0.0.2:*:web:*:*:*:*:*
  • OR cpe:/a:ibm:infosphere_master_data_management:9.5:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:infosphere_master_data_management:9.7:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:infosphere_master_data_management:11.3:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:infosphere_master_data_management:11.4:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:puredata_system:1.0.0:*:*:*:analytics:*:*:*
  • OR cpe:/a:ibm:cloud_manager:4.1.0:*:*:*:*:openstack:*:*
  • OR cpe:/a:ibm:general_parallel_file_system:3.5.0:*:*:*:*:*:*:*
  • OR cpe:/o:ibm:security_access_manager:8.0.0.5:*:mobile:*:*:*:*:*
  • OR cpe:/o:ibm:security_access_manager:8.0.0.4:*:web:*:*:*:*:*
  • OR cpe:/o:ibm:security_access_manager:8.0.0.5:*:web:*:*:*:*:*
  • OR cpe:/a:ibm:sterling_connect:express:1.5:*:*:*:unix:*:*:*
  • OR cpe:/a:ibm:infosphere_master_data_management:10.0.0:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:infosphere_master_data_management:10.1.0:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:infosphere_master_data_management:11.0.0:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:datapower_gateway:7.0.0:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:sterling_connect:express:1.4:*:*:*:unix:*:*:*
  • OR cpe:/a:ibm:workload_deployer:3.1.0.7:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:cognos_tm1:10.2:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:powerkvm:2.1:*:*:*:*:*:*:*
  • OR cpe:/o:ibm:security_access_manager:8.0.1:*:mobile:*:*:*:*:*
  • OR cpe:/o:ibm:security_access_manager:8.0.1:*:web:*:*:*:*:*
  • OR cpe:/a:ibm:security_identity_manager:7:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:datapower_gateway:7.1:*:*:*:*:*:*:*
  • OR cpe:/o:ibm:security_access_manager:8.0.1.2:*:mobile:*:*:*:*:*
  • OR cpe:/a:ibm:cloud_manager:4.2.0:*:*:*:*:openstack:*:*
  • OR cpe:/a:ibm:predictiveinsight:8.5:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:predictiveinsight:8.6:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:predictiveinsight:9.0:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:campaign:9.1.1:*:*:*:*:*:*:*
  • OR cpe:/o:ibm:security_access_manager:8.0.1.2:*:web:*:*:*:*:*
  • OR cpe:/o:ibm:security_access_manager:8.0.1.3:*:web:*:*:*:*:*
  • OR cpe:/a:ibm:infosphere_information_server:11.5:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:cloud_manager:4.3.0:*:*:*:*:openstack:*:*
  • OR cpe:/a:ibm:datapower_gateway:7.2:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:spectrum_protect_for_virtual_environments:7.1:*:*:*:*:hyper-v:*:*
  • OR cpe:/a:ibm:security_privileged_identity_manager:2.0.2:*:*:*:*:*:*:*
  • OR cpe:/o:ibm:security_network_protection_firmware:5.3.1:*:*:*:*:*:*:*
  • OR cpe:/o:ibm:security_network_protection_firmware:5.3.2:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:cognos_express:10.2.2:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:powerkvm:3.1:*:*:*:*:*:*:*
  • OR cpe:/o:ibm:security_access_manager:8.0.1.3:*:mobile:*:*:*:*:*
  • OR cpe:/o:ibm:security_access_manager:9.0:*:mobile:*:*:*:*:*
  • OR cpe:/o:ibm:security_access_manager:9.0:*:web:*:*:*:*:*
  • OR cpe:/a:ibm:infosphere_master_data_management:11.5:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:integration_bus:10.0:*:*:*:*:*:*:*
  • OR cpe:/o:ibm:security_access_manager:9.0.0.1:*:web:*:*:*:*:*
  • OR cpe:/a:ibm:campaign:9.1.2:*:*:*:*:*:*:*
  • OR cpe:/a:cisco:meetingplace:-:*:*:*:*:*:*:*
  • OR cpe:/a:cisco:socialminer:-:*:*:*:*:*:*:*
  • OR cpe:/a:cisco:webex_meetings_server:12:*:*:*:*:*:*:*
  • OR cpe:/a:cisco:webex_node_for_mcs:-:*:*:*:*:*:*:*
  • OR cpe:/a:cisco:anyconnect_secure_mobility_client:*:*:*:*:*:android:*:*
  • OR cpe:/a:cisco:anyconnect_secure_mobility_client:-:*:*:*:*:windows:*:*
  • OR cpe:/a:cisco:jabber_software_development_kit:8.6(1):*:*:*:*:*:*:*
  • OR cpe:/a:cisco:jabber:-:*:*:*:*:android:*:*
  • OR cpe:/a:cisco:jabber:-:*:*:*:*:mac:*:*
  • OR cpe:/a:cisco:jabber:-:-:*:*:*:windows:*:*
  • OR cpe:/a:cisco:webex_meetings:*:*:*:*:*:android:*:*
  • OR cpe:/a:cisco:firesight_system_software:4.10.2.1:*:*:*:*:*:*:*
  • OR cpe:/h:cisco:nac_guest_server:-:*:*:*:*:*:*:*
  • OR cpe:/a:cisco:web_security_appliance_(wsa):5.6.0-623:*:*:*:*:*:*:*
  • OR cpe:/a:cisco:application_networking_manager:-:*:*:*:*:*:*:*
  • OR cpe:/o:cisco:application_policy_infrastructure_controller_(apic):1.0(1e):*:*:*:*:*:*:*
  • OR cpe:/a:cisco:digital_media_manager:-:*:*:*:*:*:*:*
  • OR cpe:/a:cisco:mate_collector:7.1:*:*:*:*:*:*:*
  • OR cpe:/a:cisco:mate_live:1.3:*:*:*:*:*:*:*
  • OR cpe:/a:cisco:netflow_generation_appliance:1.0(2):*:*:*:*:*:*:*
  • OR cpe:/h:cisco:network_analysis_module:-:*:*:*:*:*:*:*
  • OR cpe:/a:cisco:packet_tracer:*:*:*:*:*:*:*:*
  • OR cpe:/a:cisco:prime_access_registrar:*:*:*:*:*:*:*:*
  • OR cpe:/a:cisco:prime_collaboration_assurance:-:*:*:*:*:*:*:*
  • OR cpe:/a:cisco:prime_collaboration_deployment:10.5.0:*:*:*:*:*:*:*
  • OR cpe:/a:cisco:prime_collaboration_provisioning:-:*:*:*:*:*:*:*
  • OR cpe:/a:cisco:prime_home:5.0_base:*:*:*:*:*:*:*
  • OR cpe:/a:cisco:prime_infrastructure:-:*:*:*:*:*:*:*
  • OR cpe:/a:cisco:prime_license_manager:-:*:*:*:*:*:*:*
  • OR cpe:/a:cisco:prime_network_services_controller:3.0.0:*:*:*:*:*:*:*
  • OR cpe:/a:cisco:prime_network:4.2(1.0)p1:*:*:*:*:*:*:*
  • OR cpe:/a:cisco:prime_security_manager:*:*:*:*:*:*:*:*
  • OR cpe:/a:cisco:security_manager:-:*:*:*:*:*:*:*
  • OR cpe:/a:cisco:ucs_central:*:*:*:*:*:*:*:*
  • OR cpe:/o:cisco:unified_intelligence_center:-:*:*:*:*:*:*:*
  • OR cpe:/a:cisco:asr_5000_series:16.4.1:*:*:*:*:*:*:*
  • OR cpe:/o:cisco:ios_xr:-:*:*:*:*:*:*:*
  • OR cpe:/a:cisco:common_services_platform_collector:-:*:*:*:*:*:*:*
  • OR cpe:/h:cisco:ata_187_analog_telephone_adaptor:-:*:*:*:*:*:*:*
  • OR cpe:/a:cisco:agent_desktop:-:*:*:*:*:*:*:*
  • OR cpe:/a:cisco:emergency_responder:-:*:*:*:*:*:*:*
  • OR cpe:/a:cisco:finesse:-:*:*:*:*:*:*:*
  • OR cpe:/a:cisco:hosted_collaboration_mediation_fulfillment:-:*:*:*:*:*:*:*
  • OR cpe:/a:cisco:jabber:-:*:*:*:*:*:ios:*
  • OR cpe:/a:cisco:mediasense:-:*:*:*:*:*:*:*
  • OR cpe:/a:cisco:packaged_contact_center_enterprise:*:*:*:*:*:*:*:*
  • OR cpe:/a:cisco:paging_server:*:*:*:*:*:*:*:*
  • OR cpe:/h:cisco:spa112_2-port_phone_adapter:-:*:*:*:*:*:*:*
  • OR cpe:/h:cisco:spa525g:-:*:*:*:*:*:*:*
  • OR cpe:/a:cisco:unified_communications_domain_manager:-:*:*:*:*:*:*:*
  • OR cpe:/a:cisco:unified_contact_center_enterprise:-:*:*:*:*:*:*:*
  • OR cpe:/a:cisco:unified_contact_center_express:-:*:*:*:*:*:*:*
  • OR cpe:/h:cisco:unified_ip_conference_phone_8831_for_third-party_call_control:-:*:*:*:*:*:*:*
  • OR cpe:/a:cisco:unified_intelligent_contact_management_enterprise:-:*:*:*:*:*:*:*
  • OR cpe:/o:cisco:unified_workforce_optimization:*:*:*:*:*:*:*:*
  • OR cpe:/a:cisco:virtualization_experience_media_engine:-:*:*:*:*:*:*:*
  • OR cpe:/a:cisco:expressway_series:-:*:*:*:*:*:*:*
  • OR cpe:/o:cisco:headend_system_release:-:*:*:*:*:*:*:*
  • OR cpe:/h:cisco:telepresence_1310:*:*:*:*:*:*:*:*
  • OR cpe:/a:cisco:telepresence_conductor:-:*:*:*:*:*:*:*
  • OR cpe:/a:cisco:telepresence_isdn_gw_3241:2.0(1.51):*:*:*:*:*:*:*
  • OR cpe:/h:cisco:telepresence_server_on_virtual_machine:-:*:*:*:*:*:*:*
  • OR cpe:/h:cisco:telepresence_supervisor_mse_8050:-:*:*:*:*:*:*:*
  • OR cpe:/h:cisco:telepresence_system_1300:-:*:*:*:*:*:*:*
  • OR cpe:/a:cisco:video_surveillance_media_server:-:*:*:*:*:*:*:*
  • OR cpe:/a:cisco:webex_meeting_center:-:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux_desktop:7:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux_hpc_node:7:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux_hpc_node_eus:7.2:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux_server:7:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux_server_aus:7.2:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux_server_eus:7.2:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux_workstation:7:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:security_identity_governance_and_intelligence:5.2.1:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux_desktop:6:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux_hpc_node:6:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux_server:6:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux_server_eus:6.7.z:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux_workstation:6:*:*:*:*:*:*:*
  • OR cpe:/o:ibm:security_access_manager:9.0.1:*:web:*:*:*:*:*
  • OR cpe:/a:ibm:datapower_gateway:7.5:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:smartcloud_entry:3.3:*:*:*:*:*:*:*
  • OR cpe:/o:ibm:security_access_manager:8.0.1.4:*:mobile:*:*:*:*:*
  • OR cpe:/o:ibm:security_access_manager:8.0.1.4:*:web:*:*:*:*:*
  • OR cpe:/a:ibm:datapower_gateway:7.5.1:*:*:*:*:*:*:*
  • OR cpe:/a:redhat:jboss_core_services:2.4.6:*:*:*:apache_http_server:*:*:*
  • OR cpe:/a:ibm:spectrum_protect:8.1:*:*:*:virtual_environments:*:*:*
  • OR cpe:/a:ibm:data_ontap:8.2.1:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:data_ontap:8.2.2:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:data_ontap:8.2.3:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:data_ontap:8.2.4:*:*:*:*:*:*:*

  • * Denotes that component is vulnerable
    Oval Definitions
    Definition IDClassTitleLast Modified
    oval:org.cisecurity:def:933
    V
    Vulnerability in OpenSSL affects AIX
    2016-08-12
    oval:com.redhat.rhsa:def:20160996
    P
    RHSA-2016:0996: openssl security update (Important)
    2016-05-10
    oval:com.redhat.rhsa:def:20160722
    P
    RHSA-2016:0722: openssl security update (Important)
    2016-05-09
    oval:com.ubuntu.xenial:def:20162842000
    V
    CVE-2016-2842 on Ubuntu 16.04 LTS (xenial) - medium.
    2016-03-03
    oval:com.ubuntu.xenial:def:201628420000000
    V
    CVE-2016-2842 on Ubuntu 16.04 LTS (xenial) - medium.
    2016-03-03
    oval:com.ubuntu.cosmic:def:20162842000
    V
    CVE-2016-2842 on Ubuntu 18.10 (cosmic) - medium.
    2016-03-03
    oval:com.ubuntu.disco:def:201628420000000
    V
    CVE-2016-2842 on Ubuntu 19.04 (disco) - medium.
    2016-03-03
    oval:com.ubuntu.precise:def:20162842000
    V
    CVE-2016-2842 on Ubuntu 12.04 LTS (precise) - medium.
    2016-03-03
    oval:com.ubuntu.cosmic:def:201628420000000
    V
    CVE-2016-2842 on Ubuntu 18.10 (cosmic) - medium.
    2016-03-03
    oval:com.ubuntu.artful:def:20162842000
    V
    CVE-2016-2842 on Ubuntu 17.10 (artful) - medium.
    2016-03-03
    oval:com.ubuntu.trusty:def:20162842000
    V
    CVE-2016-2842 on Ubuntu 14.04 LTS (trusty) - medium.
    2016-03-03
    oval:com.ubuntu.bionic:def:201628420000000
    V
    CVE-2016-2842 on Ubuntu 18.04 LTS (bionic) - medium.
    2016-03-03
    oval:com.ubuntu.bionic:def:20162842000
    V
    CVE-2016-2842 on Ubuntu 18.04 LTS (bionic) - medium.
    2016-03-03
    BACK
    openssl openssl 1.0.1
    openssl openssl 1.0.1 beta1
    openssl openssl 1.0.1 beta2
    openssl openssl 1.0.1 beta3
    openssl openssl 1.0.1a
    openssl openssl 1.0.1b
    openssl openssl 1.0.1c
    openssl openssl 1.0.1d
    openssl openssl 1.0.1e
    openssl openssl 1.0.1f
    openssl openssl 1.0.1g
    openssl openssl 1.0.1h
    openssl openssl 1.0.1i
    openssl openssl 1.0.1j
    openssl openssl 1.0.1k
    openssl openssl 1.0.1l
    openssl openssl 1.0.1m
    openssl openssl 1.0.1n
    openssl openssl 1.0.1o
    openssl openssl 1.0.1p
    openssl openssl 1.0.1q
    openssl openssl 1.0.1r
    openssl openssl 1.0.2
    openssl openssl 1.0.2 beta1
    openssl openssl 1.0.2 beta2
    openssl openssl 1.0.2 beta3
    openssl openssl 1.0.2a
    openssl openssl 1.0.2b
    openssl openssl 1.0.2c
    openssl openssl 1.0.2d
    openssl openssl 1.0.2e
    openssl openssl 1.0.2f
    openssl openssl 1.0.2
    openssl openssl 1.0.1
    cisco telepresence system 500-32 -
    cisco telepresence system 500-37 -
    ibm tivoli netcool/reporter 2.2
    ibm infosphere information server 8.5
    ibm infosphere master data management 10.1
    ibm infosphere information server 8.7
    ibm cognos tm1 10.1.0
    ibm infosphere information server 9.1
    ibm infosphere master data management 10.0
    ibm qradar security information and event manager 7.1
    ibm cognos express 10.1
    ibm infosphere master data management 11.0
    ibm integration bus 9.0
    ibm tivoli provisioning manager 5.1.1
    ibm campaign 8.6
    ibm campaign 9.0
    ibm campaign 9.1
    ibm qradar security information and event manager 7.2
    ibm security access manager 7.0
    ibm cognos express 10.2.1
    ibm security access manager 8.0
    ibm security access manager 8.0
    ibm cognos tm1 10.2.2
    ibm smartcloud entry 3.2
    ibm tivoli provisioning manager 7.1.1
    ibm security access manager 8.0.0.1
    ibm security access manager 8.0.0.2
    ibm security access manager 8.0.0.3
    ibm security access manager 8.0.0.4
    ibm tealeaf customer experience 16.1.01
    ibm infosphere information server 11.3
    ibm i 7.1
    ibm i 7.2
    ibm cognos insight 10.2
    ibm cognos insight 10.2.1
    ibm cognos insight 10.2.2
    ibm security access manager 8.0.0.2
    ibm infosphere master data management 9.5
    ibm infosphere master data management 9.7
    ibm infosphere master data management 11.3
    ibm infosphere master data management 11.4
    ibm puredata system 1.0.0
    ibm cloud manager 4.1.0
    ibm general parallel file system 3.5.0
    ibm security access manager 8.0.0.5
    ibm security access manager 8.0.0.4
    ibm security access manager 8.0.0.5
    ibm sterling connect:express 1.5
    ibm infosphere master data management 10.0.0
    ibm infosphere master data management 10.1.0
    ibm infosphere master data management 11.0.0
    ibm datapower gateway 7.0.0
    ibm sterling connect:express 1.4
    ibm workload deployer 3.1.0.7
    ibm cognos tm1 10.2
    ibm powerkvm 2.1
    ibm security access manager 8.0.1
    ibm security access manager 8.0.1
    ibm security identity manager 7
    ibm datapower gateway 7.1
    ibm security access manager 8.0.1.2
    ibm cloud manager 4.2.0
    ibm predictiveinsight 8.5
    ibm predictiveinsight 8.6
    ibm predictiveinsight 9.0
    ibm campaign 9.1.1
    ibm security access manager 8.0.1.2
    ibm security access manager 8.0.1.3
    ibm infosphere information server 11.5
    ibm cloud manager 4.3.0
    ibm datapower gateway 7.2
    ibm spectrum protect for virtual environments 7.1
    ibm security privileged identity manager 2.0.2
    ibm security network protection firmware 5.3.1
    ibm security network protection firmware 5.3.2
    ibm cognos express 10.2.2
    ibm powerkvm 3.1
    ibm security access manager 8.0.1.3
    ibm security access manager 9.0
    ibm security access manager 9.0
    ibm infosphere master data management 11.5
    ibm integration bus 10.0
    ibm security access manager for web 9.0.0.1 -
    ibm campaign 9.1.2
    cisco meetingplace -
    cisco socialminer -
    cisco webex meetings server 12
    cisco webex node for mcs -
    cisco anyconnect secure mobility client *
    cisco anyconnect secure mobility client -
    cisco jabber software development kit 8.6(1)
    cisco jabber -
    cisco jabber -
    cisco jabber - -
    cisco webex meetings *
    cisco firesight system software 4.10.2.1
    cisco nac guest server -
    cisco web security appliance (wsa) 5.6.0-623
    cisco application networking manager -
    cisco application policy infrastructure controller (apic) 1.0(1e)
    cisco digital media manager -
    cisco mate collector 7.1
    cisco mate live 1.3
    cisco netflow generation appliance 1.0(2)
    cisco network analysis module -
    cisco packet tracer *
    cisco prime access registrar *
    cisco prime collaboration assurance -
    cisco prime collaboration deployment 10.5.0
    cisco prime collaboration provisioning -
    cisco prime home 5.0_base
    cisco prime infrastructure -
    cisco prime license manager -
    cisco prime network services controller 3.0.0
    cisco prime network 4.2(1.0)p1
    cisco prime security manager *
    cisco security manager -
    cisco ucs central *
    cisco unified intelligence center -
    cisco asr 5000 series 16.4.1
    cisco ios xr -
    cisco common services platform collector -
    cisco ata 187 analog telephone adaptor -
    cisco agent desktop -
    cisco emergency responder -
    cisco finesse -
    cisco hosted collaboration mediation fulfillment -
    cisco jabber -
    cisco mediasense -
    cisco packaged contact center enterprise *
    cisco paging server *
    cisco spa112 2-port phone adapter -
    cisco spa525g -
    cisco unified communications domain manager -
    cisco unified contact center enterprise -
    cisco unified contact center express -
    cisco unified ip conference phone 8831 for third-party call control -
    cisco unified intelligent contact management enterprise -
    cisco unified workforce optimization *
    cisco virtualization experience media engine -
    cisco expressway series -
    cisco headend system release -
    cisco telepresence 1310 *
    cisco telepresence conductor -
    cisco telepresence isdn gw 3241 2.0(1.51)
    cisco telepresence server on virtual machine -
    cisco telepresence supervisor mse 8050 -
    cisco telepresence system 1300 -
    cisco video surveillance media server -
    cisco webex meeting center -
    redhat enterprise linux desktop 7
    redhat enterprise linux hpc node 7
    redhat enterprise linux hpc node eus 7.2
    redhat enterprise linux server 7
    redhat enterprise linux server aus 7.2
    redhat enterprise linux server eus 7.2
    redhat enterprise linux workstation 7
    ibm security identity governance and intelligence 5.2.1
    redhat enterprise linux desktop 6
    redhat enterprise linux hpc node 6
    redhat enterprise linux server 6
    redhat enterprise linux server eus 6.7.z
    redhat enterprise linux workstation 6
    ibm security access manager for web 9.0.1 -
    ibm datapower gateway 7.5
    ibm smartcloud entry 3.3
    ibm security access manager 8.0.1.4
    ibm security access manager for web 8.0.1.4
    ibm datapower gateway 7.5.1
    redhat jboss core services 2.4.6
    ibm spectrum protect 8.1
    ibm data ontap 8.2.1
    ibm data ontap 8.2.2
    ibm data ontap 8.2.3
    ibm data ontap 8.2.4