Risk | Low |
Patch available | YES |
Number of vulnerabilities | 1 |
CVE-ID | CVE-2016-6306 |
CWE-ID | CWE-125 |
Exploitation vector | Network |
Public exploit | N/A |
Vulnerable software |
openssl (Alpine package) Operating systems & Components / Operating system package or component |
Vendor | Alpine Linux Development Team |
Security Bulletin
This security bulletin contains one low risk vulnerability.
EUVDB-ID: #VU816
Risk: Low
CVSSv4.0: 6.6 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2016-6306
CWE-ID:
CWE-125 - Out-of-bounds read
Exploit availability: No
DescriptionThe vulnerability allows a remote unauthenticated user to cause DoS conditions on the target system.
The weakess exists due insufficient length validation of certain TLS/SSL protocol handshake messages. By causing out-of-bounds read error attackers can trigger the affected service deny.
Successful exploitation of the vulnerability will result in denial of service on the vulnerable system.
Install update from vendor's website.
Vulnerable software versionsopenssl (Alpine package): 1.0.2h-r4-r0 - 1.0.2h-r4
CPE2.3https://git.alpinelinux.org/aports/commit/?id=4a8e032821bd6376b9019298b0bea706aa7dd8d4
https://git.alpinelinux.org/aports/commit/?id=c57b41c34309ede6b832e2edc306f6ab14a5d78c
https://git.alpinelinux.org/aports/commit/?id=3a3ffbd8e2b0a4b3e1b8fcf62f913a691bb4dae4
https://git.alpinelinux.org/aports/commit/?id=3cd2cd34c2859d94c7cfa8bfd46c5ac71b26893e
https://git.alpinelinux.org/aports/commit/?id=7cfa29eeb94474b3bf44e4be19b4e2263ac6b479
https://git.alpinelinux.org/aports/commit/?id=a38f0ddf93adc4fd2f8255cbd1c94ab704b007ac
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.