SB2016050949 - Red Hat Enterprise Linux 7 update for openssl
Published: May 9, 2016 Updated: April 24, 2025
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 7 secuirty vulnerabilities.
1) Buffer overflow (CVE-ID: CVE-2016-0799)
The vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to fmtstr function in crypto/bio/b_print.c in OpenSSL improperly calculates string lengths. A remote attacker can cause a denial of service (overflow and out-of-bounds read) or possibly have unspecified other impact via a long string.
2) Heap overflow (CVE-ID: CVE-2016-2105)
The vulnerability allows a remote user to cause heap overflow on the target system.The weakness is caused by insufficient input validation. By sending a great deal of input data attackers are able to cause overflow of the EVP_EncodeUpdate() function used for binary data encoding.
Successful exploitation of the vulnerability may result in heap overflow on the vulnerable system.
3) Input validation error (CVE-ID: CVE-2016-2106)
The vulnerability allows a remote non-authenticated attacker to perform a denial of service (DoS) attack.
Integer overflow in the EVP_EncryptUpdate function in crypto/evp/evp_enc.c in OpenSSL before 1.0.1t and 1.0.2 before 1.0.2h allows remote attackers to cause a denial of service (heap memory corruption) via a large amount of data.
4) Traffic decryption (CVE-ID: CVE-2016-2107)
The vulnerability allows a remote user to decrypt traffic on the target system.The weakness is due to access control error.If the connection uses an AES CBC cipher and the server support AES-NI attackers can perform padding oracle attack.
Successful exploitation of the vulnerability leads to traffic decryption on the vulnerable system.
5) Memory corruption (CVE-ID: CVE-2016-2108)
The vulnerability allows a remote user to cause memory corruption on the target system.The weakness exists due to buffer underflow with an out-of-bounds write in i2c_ASN1_INTEGER. As ASN.1 parser (specifically, d2i_ASN1_TYPE) can misinterpret a large universal tag as a negative zero value, attacker may easily corrupt memory.
Successful exploitation of the vulnerability will allow a malicious user to trigger memory corruption on the vulnerable system.
6) Excessive memory allocation (CVE-ID: CVE-2016-2109)
The vulnerability allows a remote user to cause excessive memory allocation on the target system.The weakness exists during reading ASN.1 data by d2i_CMS_bio() function. A short invalid encoding leads to distribution of large amounts of memory for excessive resources or exhausting memory.
Successful exploitation of the vulnerability may result in excessive memory allocation.
7) Buffer overflow (CVE-ID: CVE-2016-2842)
The vulnerability allows a remote attacker to cause a denial of service.
The vulnerability exists due to a doapr_outch function in crypto/bio/b_print.c in OpenSSL does not verify that a certain memory allocation succeeds. A remote attacker can cause a denial of service (out-of-bounds write or memory consumption) or possibly have unspecified other impact via a long string
Remediation
Install update from vendor's website.