CVE-2016-2183
Detail
Deferred
This CVE record is not being prioritized for NVD enrichment efforts due to resource or other concerns.
Description
The DES and Triple DES ciphers, as used in the TLS, SSH, and IPSec protocols and other protocols and products, have a birthday bound of approximately four billion blocks, which makes it easier for remote attackers to obtain cleartext data via a birthday attack against a long-duration encrypted session, as demonstrated by an HTTPS session using Triple DES in CBC mode, aka a "Sweet32" attack.
Metrics
CVSS Version 4.0
CVSS Version 3.x
CVSS Version 2.0
NVD enrichment efforts reference publicly available information to associate
vector strings. CVSS information contributed by other sources is also
displayed.
CVSS 4.0 Severity and Vector Strings:
NVD assessment
not yet provided.
CVSS 3.x Severity and Vector Strings:
Vector:
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
CVSS 2.0 Severity and Vector Strings:
Vector:
(AV:N/AC:L/Au:N/C:P/I:N/A:N)
References to Advisories, Solutions, and Tools
By selecting these links, you will be leaving NIST webspace.
We have provided these links to other web sites because they
may have information that would be of interest to you. No
inferences should be drawn on account of other sites being
referenced, or not, from this page. There may be other web
sites that are more appropriate for your purpose. NIST does
not necessarily endorse the views expressed, or concur with
the facts presented on these sites. Further, NIST does not
endorse any commercial products that may be mentioned on
these sites. Please address comments about this page to nvd@nist.gov .
URL
Source(s)
Tag(s)
http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10759
CVE, Inc., Red Hat
Third Party Advisory
http://lists.opensuse.org/opensuse-security-announce/2016-09/msg00022.html
CVE, Inc., Red Hat
Mailing List
Third Party Advisory
http://lists.opensuse.org/opensuse-security-announce/2016-09/msg00023.html
CVE, Inc., Red Hat
Mailing List
Third Party Advisory
http://lists.opensuse.org/opensuse-security-announce/2016-09/msg00024.html
CVE, Inc., Red Hat
Mailing List
Third Party Advisory
http://lists.opensuse.org/opensuse-security-announce/2016-09/msg00031.html
CVE, Inc., Red Hat
Mailing List
Third Party Advisory
http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00005.html
CVE, Inc., Red Hat
Mailing List
Third Party Advisory
http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00011.html
CVE, Inc., Red Hat
Mailing List
Third Party Advisory
http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00012.html
CVE, Inc., Red Hat
Mailing List
Third Party Advisory
http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00013.html
CVE, Inc., Red Hat
Third Party Advisory
http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00021.html
CVE, Inc., Red Hat
Mailing List
Third Party Advisory
http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00029.html
CVE, Inc., Red Hat
Mailing List
Third Party Advisory
http://lists.opensuse.org/opensuse-security-announce/2017-01/msg00068.html
CVE, Inc., Red Hat
Mailing List
Third Party Advisory
http://lists.opensuse.org/opensuse-security-announce/2017-02/msg00003.html
CVE, Inc., Red Hat
Mailing List
Third Party Advisory
http://lists.opensuse.org/opensuse-security-announce/2017-02/msg00023.html
CVE, Inc., Red Hat
Mailing List
Third Party Advisory
http://lists.opensuse.org/opensuse-security-announce/2017-02/msg00028.html
CVE, Inc., Red Hat
Mailing List
Third Party Advisory
http://lists.opensuse.org/opensuse-security-announce/2017-02/msg00032.html
CVE, Inc., Red Hat
Mailing List
Third Party Advisory
http://lists.opensuse.org/opensuse-security-announce/2017-05/msg00076.html
CVE, Inc., Red Hat
Mailing List
Third Party Advisory
http://lists.opensuse.org/opensuse-security-announce/2017-10/msg00010.html
CVE, Inc., Red Hat
Mailing List
Third Party Advisory
http://lists.opensuse.org/opensuse-security-announce/2017-10/msg00011.html
CVE, Inc., Red Hat
Mailing List
Third Party Advisory
http://lists.opensuse.org/opensuse-security-announce/2018-02/msg00032.html
CVE, Inc., Red Hat
Mailing List
Third Party Advisory
http://packetstormsecurity.com/files/142756/IBM-Informix-Dynamic-Server-DLL-Injection-Code-Execution.html
CVE, Inc., Red Hat
Third Party Advisory
VDB Entry
http://rhn.redhat.com/errata/RHSA-2017-0336.html
CVE, Inc., Red Hat
Third Party Advisory
http://rhn.redhat.com/errata/RHSA-2017-0337.html
CVE, Inc., Red Hat
Third Party Advisory
http://rhn.redhat.com/errata/RHSA-2017-0338.html
CVE, Inc., Red Hat
Third Party Advisory
http://rhn.redhat.com/errata/RHSA-2017-0462.html
CVE, Inc., Red Hat
Third Party Advisory
http://seclists.org/fulldisclosure/2017/Jul/31
CVE, Inc., Red Hat
Mailing List
Third Party Advisory
http://seclists.org/fulldisclosure/2017/May/105
CVE, Inc., Red Hat
Mailing List
Third Party Advisory
http://www-01.ibm.com/support/docview.wss?uid=nas8N1021697
CVE, Inc., Red Hat
Third Party Advisory
http://www-01.ibm.com/support/docview.wss?uid=swg21991482
CVE, Inc., Red Hat
Third Party Advisory
http://www-01.ibm.com/support/docview.wss?uid=swg21995039
CVE, Inc., Red Hat
Third Party Advisory
http://www.debian.org/security/2016/dsa-3673
CVE, Inc., Red Hat
Third Party Advisory
http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20170322-01-openssl-en
CVE, Inc., Red Hat
Third Party Advisory
http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html
CVE, Inc., Red Hat
Patch
Third Party Advisory
http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html
CVE, Inc., Red Hat
Patch
Third Party Advisory
http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html
CVE, Inc., Red Hat
Patch
Third Party Advisory
http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html
CVE, Inc., Red Hat
Patch
Third Party Advisory
http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
CVE, Inc., Red Hat
Patch
Third Party Advisory
http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2016-3090545.html
CVE, Inc., Red Hat
Third Party Advisory
http://www.oracle.com/technetwork/topics/security/ovmbulletinoct2016-3090547.html
CVE, Inc., Red Hat
Third Party Advisory
http://www.securityfocus.com/archive/1/539885/100/0/threaded
CVE, Inc., Red Hat
Third Party Advisory
VDB Entry
http://www.securityfocus.com/archive/1/540341/100/0/threaded
CVE, Inc., Red Hat
Third Party Advisory
VDB Entry
http://www.securityfocus.com/archive/1/541104/100/0/threaded
CVE, Inc., Red Hat
Third Party Advisory
VDB Entry
http://www.securityfocus.com/archive/1/542005/100/0/threaded
CVE, Inc., Red Hat
Third Party Advisory
VDB Entry
http://www.securityfocus.com/archive/1/archive/1/539885/100/0/threaded
CVE, Inc., Red Hat
Third Party Advisory
VDB Entry
http://www.securityfocus.com/archive/1/archive/1/540129/100/0/threaded
CVE, Inc., Red Hat
Third Party Advisory
VDB Entry
http://www.securityfocus.com/archive/1/archive/1/540341/100/0/threaded
CVE, Inc., Red Hat
Third Party Advisory
VDB Entry
http://www.securityfocus.com/archive/1/archive/1/541104/100/0/threaded
CVE, Inc., Red Hat
Third Party Advisory
VDB Entry
http://www.securityfocus.com/archive/1/archive/1/542005/100/0/threaded
CVE, Inc., Red Hat
Third Party Advisory
VDB Entry
http://www.securityfocus.com/bid/92630
CVE, Inc., Red Hat
Third Party Advisory
VDB Entry
http://www.securityfocus.com/bid/95568
CVE, Inc., Red Hat
Third Party Advisory
VDB Entry
http://www.securitytracker.com/id/1036696
CVE, Inc., Red Hat
Third Party Advisory
VDB Entry
http://www.splunk.com/view/SP-CAAAPSV
CVE, Inc., Red Hat
Third Party Advisory
http://www.splunk.com/view/SP-CAAAPUE
CVE, Inc., Red Hat
Third Party Advisory
http://www.ubuntu.com/usn/USN-3087-1
CVE, Inc., Red Hat
Third Party Advisory
http://www.ubuntu.com/usn/USN-3087-2
CVE, Inc., Red Hat
Third Party Advisory
http://www.ubuntu.com/usn/USN-3179-1
CVE, Inc., Red Hat
Third Party Advisory
http://www.ubuntu.com/usn/USN-3194-1
CVE, Inc., Red Hat
Third Party Advisory
http://www.ubuntu.com/usn/USN-3198-1
CVE, Inc., Red Hat
Third Party Advisory
http://www.ubuntu.com/usn/USN-3270-1
CVE, Inc., Red Hat
Third Party Advisory
http://www.ubuntu.com/usn/USN-3372-1
CVE, Inc., Red Hat
Third Party Advisory
https://access.redhat.com/articles/2548661
CVE, Inc., Red Hat
Mitigation
Third Party Advisory
https://access.redhat.com/errata/RHSA-2017:1216
CVE, Inc., Red Hat
Third Party Advisory
https://access.redhat.com/errata/RHSA-2017:2708
CVE, Inc., Red Hat
Third Party Advisory
https://access.redhat.com/errata/RHSA-2017:2709
CVE, Inc., Red Hat
Third Party Advisory
https://access.redhat.com/errata/RHSA-2017:2710
CVE, Inc., Red Hat
Third Party Advisory
https://access.redhat.com/errata/RHSA-2017:3113
CVE, Inc., Red Hat
Third Party Advisory
https://access.redhat.com/errata/RHSA-2017:3114
CVE, Inc., Red Hat
Third Party Advisory
https://access.redhat.com/errata/RHSA-2017:3239
CVE, Inc., Red Hat
Third Party Advisory
https://access.redhat.com/errata/RHSA-2017:3240
CVE, Inc., Red Hat
Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:2123
CVE, Inc., Red Hat
Third Party Advisory
https://access.redhat.com/errata/RHSA-2019:1245
CVE, Inc., Red Hat
Third Party Advisory
https://access.redhat.com/errata/RHSA-2019:2859
CVE, Inc., Red Hat
Third Party Advisory
https://access.redhat.com/errata/RHSA-2020:0451
CVE, Inc., Red Hat
Third Party Advisory
https://access.redhat.com/security/cve/cve-2016-2183
CVE, Inc., Red Hat
Third Party Advisory
https://blog.cryptographyengineering.com/2016/08/24/attack-of-week-64-bit-ciphers-in-tls/
CVE, Inc., Red Hat
Press/Media Coverage
Technical Description
Third Party Advisory
https://bto.bluecoat.com/security-advisory/sa133
CVE, Inc., Red Hat
Third Party Advisory
https://bugzilla.redhat.com/show_bug.cgi?id=1369383
CVE, Inc., Red Hat
Issue Tracking
Third Party Advisory
https://cert-portal.siemens.com/productcert/pdf/ssa-412672.pdf
CVE, Inc., Red Hat
https://github.com/ssllabs/ssllabs-scan/issues/387#issuecomment-242514633
CVE, Inc., Red Hat
Third Party Advisory
https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c05302448
CVE, Inc., Red Hat
Third Party Advisory
https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c05369403
CVE, Inc., Red Hat
Third Party Advisory
https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c05369415
CVE, Inc., Red Hat
Third Party Advisory
https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c05385680
CVE, Inc., Red Hat
Third Party Advisory
https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c05390722
CVE, Inc., Red Hat
Third Party Advisory
https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c05390849
CVE, Inc., Red Hat
Third Party Advisory
https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbgn03765en_us
CVE, Inc., Red Hat
Third Party Advisory
https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03725en_us
CVE, Inc., Red Hat
Third Party Advisory
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05302448
CVE, Inc., Red Hat
Third Party Advisory
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05309984
CVE, Inc., Red Hat
Third Party Advisory
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05323116
CVE, Inc., Red Hat
Third Party Advisory
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05349499
CVE, Inc., Red Hat
Third Party Advisory
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05356388
CVE, Inc., Red Hat
Third Party Advisory
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05369403
CVE, Inc., Red Hat
Third Party Advisory
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05369415
CVE, Inc., Red Hat
Third Party Advisory
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05385680
CVE, Inc., Red Hat
Third Party Advisory
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722
CVE, Inc., Red Hat
Third Party Advisory
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390849
CVE, Inc., Red Hat
Third Party Advisory
https://ics-cert.us-cert.gov/advisories/ICSMA-18-058-02
CVE, Inc., Red Hat
Third Party Advisory
US Government Resource
https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA40312
CVE, Inc., Red Hat
Third Party Advisory
https://kc.mcafee.com/corporate/index?page=content&id=SB10171
CVE, Inc., Red Hat
Third Party Advisory
https://kc.mcafee.com/corporate/index?page=content&id=SB10186
CVE, Inc., Red Hat
Third Party Advisory
https://kc.mcafee.com/corporate/index?page=content&id=SB10197
CVE, Inc., Red Hat
Third Party Advisory
https://kc.mcafee.com/corporate/index?page=content&id=SB10215
CVE, Inc., Red Hat
Third Party Advisory
https://kc.mcafee.com/corporate/index?page=content&id=SB10310
CVE, Inc., Red Hat
Third Party Advisory
https://nakedsecurity.sophos.com/2016/08/25/anatomy-of-a-cryptographic-collision-the-sweet32-attack/
CVE, Inc., Red Hat
Press/Media Coverage
Technical Description
Third Party Advisory
https://nodejs.org/en/blog/vulnerability/september-2016-security-releases/
CVE, Inc., Red Hat
Third Party Advisory
https://seclists.org/bugtraq/2018/Nov/21
CVE, Inc., Red Hat
Mailing List
Third Party Advisory
https://security.gentoo.org/glsa/201612-16
CVE, Inc., Red Hat
Third Party Advisory
https://security.gentoo.org/glsa/201701-65
CVE, Inc., Red Hat
Third Party Advisory
https://security.gentoo.org/glsa/201707-01
CVE, Inc., Red Hat
Third Party Advisory
https://security.netapp.com/advisory/ntap-20160915-0001/
CVE, Inc., Red Hat
Third Party Advisory
https://security.netapp.com/advisory/ntap-20170119-0001/
CVE, Inc., Red Hat
Third Party Advisory
https://softwaresupport.softwaregrp.com/document/-/facetsearch/document/KM03158613
CVE, Inc., Red Hat
Third Party Advisory
https://softwaresupport.softwaregrp.com/document/-/facetsearch/document/KM03286178
CVE, Inc., Red Hat
Third Party Advisory
https://support.f5.com/csp/article/K13167034
CVE, Inc., Red Hat
Third Party Advisory
https://sweet32.info/
CVE, Inc., Red Hat
Technical Description
Third Party Advisory
https://wiki.opendaylight.org/view/Security_Advisories
CVE, Inc., Red Hat
Third Party Advisory
https://www.arista.com/en/support/advisories-notices/security-advisories/1749-security-advisory-24
CVE, Inc., Red Hat
Third Party Advisory
https://www.exploit-db.com/exploits/42091/
CVE, Inc., Red Hat
Third Party Advisory
VDB Entry
https://www.ietf.org/mail-archive/web/tls/current/msg04560.html
CVE, Inc., Red Hat
Mailing List
Third Party Advisory
https://www.mitel.com/en-ca/support/security-advisories/mitel-product-security-advisory-17-0008
CVE, Inc., Red Hat
Third Party Advisory
https://www.nccgroup.trust/us/about-us/newsroom-and-events/blog/2016/august/new-practical-attacks-on-64-bit-block-ciphers-3des-blowfish/
CVE, Inc., Red Hat
Press/Media Coverage
Technical Description
Third Party Advisory
https://www.openssl.org/blog/blog/2016/08/24/sweet32/
CVE, Inc., Red Hat
Mitigation
Press/Media Coverage
Third Party Advisory
https://www.oracle.com/security-alerts/cpuapr2020.html
CVE, Inc., Red Hat
Third Party Advisory
https://www.oracle.com/security-alerts/cpujan2020.html
CVE, Inc., Red Hat
Third Party Advisory
https://www.oracle.com/security-alerts/cpujul2020.html
CVE, Inc., Red Hat
Third Party Advisory
https://www.oracle.com/security-alerts/cpuoct2020.html
CVE, Inc., Red Hat
Third Party Advisory
https://www.oracle.com/security-alerts/cpuoct2021.html
CVE, Inc., Red Hat
Third Party Advisory
https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html
CVE, Inc., Red Hat
Patch
Third Party Advisory
https://www.sigsac.org/ccs/CCS2016/accepted-papers/
CVE, Inc., Red Hat
Third Party Advisory
https://www.tenable.com/security/tns-2016-16
CVE, Inc., Red Hat
Third Party Advisory
https://www.tenable.com/security/tns-2016-20
CVE, Inc., Red Hat
Third Party Advisory
https://www.tenable.com/security/tns-2016-21
CVE, Inc., Red Hat
Third Party Advisory
https://www.tenable.com/security/tns-2017-09
CVE, Inc., Red Hat
Third Party Advisory
https://www.teskalabs.com/blog/teskalabs-bulletin-160826-seacat-sweet32-issue
CVE, Inc., Red Hat
Third Party Advisory
https://www.vicarius.io/vsociety/posts/cve-2016-2183-detection-sweet32-vulnerability
CVE
https://www.vicarius.io/vsociety/posts/cve-2016-2183-mitigate-sweet32-vulnerability
CVE
Weakness Enumeration
CWE-ID
CWE Name
Source
CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
NIST
Change History
66 change records found show changes
CVE Modified by CVE 3/31/2025 11:15:36 AM
Action
Type
Old Value
New Value
Added
Reference
https://www.vicarius.io/vsociety/posts/cve-2016-2183-detection-sweet32-vulnerability
Added
Reference
https://www.vicarius.io/vsociety/posts/cve-2016-2183-mitigate-sweet32-vulnerability
CVE Modified by CVE 11/20/2024 9:47:59 PM
Action
Type
Old Value
New Value
Added
Reference
http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10759
Added
Reference
http://lists.opensuse.org/opensuse-security-announce/2016-09/msg00022.html
Added
Reference
http://lists.opensuse.org/opensuse-security-announce/2016-09/msg00023.html
Added
Reference
http://lists.opensuse.org/opensuse-security-announce/2016-09/msg00024.html
Added
Reference
http://lists.opensuse.org/opensuse-security-announce/2016-09/msg00031.html
Added
Reference
http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00005.html
Added
Reference
http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00011.html
Added
Reference
http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00012.html
Added
Reference
http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00013.html
Added
Reference
http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00021.html
Added
Reference
http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00029.html
Added
Reference
http://lists.opensuse.org/opensuse-security-announce/2017-01/msg00068.html
Added
Reference
http://lists.opensuse.org/opensuse-security-announce/2017-02/msg00003.html
Added
Reference
http://lists.opensuse.org/opensuse-security-announce/2017-02/msg00023.html
Added
Reference
http://lists.opensuse.org/opensuse-security-announce/2017-02/msg00028.html
Added
Reference
http://lists.opensuse.org/opensuse-security-announce/2017-02/msg00032.html
Added
Reference
http://lists.opensuse.org/opensuse-security-announce/2017-05/msg00076.html
Added
Reference
http://lists.opensuse.org/opensuse-security-announce/2017-10/msg00010.html
Added
Reference
http://lists.opensuse.org/opensuse-security-announce/2017-10/msg00011.html
Added
Reference
http://lists.opensuse.org/opensuse-security-announce/2018-02/msg00032.html
Added
Reference
http://packetstormsecurity.com/files/142756/IBM-Informix-Dynamic-Server-DLL-Injection-Code-Execution.html
Added
Reference
http://rhn.redhat.com/errata/RHSA-2017-0336.html
Added
Reference
http://rhn.redhat.com/errata/RHSA-2017-0337.html
Added
Reference
http://rhn.redhat.com/errata/RHSA-2017-0338.html
Added
Reference
http://rhn.redhat.com/errata/RHSA-2017-0462.html
Added
Reference
http://seclists.org/fulldisclosure/2017/Jul/31
Added
Reference
http://seclists.org/fulldisclosure/2017/May/105
Added
Reference
http://seclists.org/fulldisclosure/2017/May/105
Added
Reference
http://www-01.ibm.com/support/docview.wss?uid=nas8N1021697
Added
Reference
http://www-01.ibm.com/support/docview.wss?uid=swg21991482
Added
Reference
http://www-01.ibm.com/support/docview.wss?uid=swg21995039
Added
Reference
http://www.debian.org/security/2016/dsa-3673
Added
Reference
http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20170322-01-openssl-en
Added
Reference
http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html
Added
Reference
http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html
Added
Reference
http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html
Added
Reference
http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html
Added
Reference
http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
Added
Reference
http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2016-3090545.html
Added
Reference
http://www.oracle.com/technetwork/topics/security/ovmbulletinoct2016-3090547.html
Added
Reference
http://www.securityfocus.com/archive/1/539885/100/0/threaded
Added
Reference
http://www.securityfocus.com/archive/1/540341/100/0/threaded
Added
Reference
http://www.securityfocus.com/archive/1/541104/100/0/threaded
Added
Reference
http://www.securityfocus.com/archive/1/542005/100/0/threaded
Added
Reference
http://www.securityfocus.com/archive/1/archive/1/539885/100/0/threaded
Added
Reference
http://www.securityfocus.com/archive/1/archive/1/540129/100/0/threaded
Added
Reference
http://www.securityfocus.com/archive/1/archive/1/540341/100/0/threaded
Added
Reference
http://www.securityfocus.com/archive/1/archive/1/541104/100/0/threaded
Added
Reference
http://www.securityfocus.com/archive/1/archive/1/542005/100/0/threaded
Added
Reference
http://www.securityfocus.com/bid/92630
Added
Reference
http://www.securityfocus.com/bid/95568
Added
Reference
http://www.securitytracker.com/id/1036696
Added
Reference
http://www.splunk.com/view/SP-CAAAPSV
Added
Reference
http://www.splunk.com/view/SP-CAAAPUE
Added
Reference
http://www.ubuntu.com/usn/USN-3087-1
Added
Reference
http://www.ubuntu.com/usn/USN-3087-2
Added
Reference
http://www.ubuntu.com/usn/USN-3179-1
Added
Reference
http://www.ubuntu.com/usn/USN-3194-1
Added
Reference
http://www.ubuntu.com/usn/USN-3198-1
Added
Reference
http://www.ubuntu.com/usn/USN-3270-1
Added
Reference
http://www.ubuntu.com/usn/USN-3372-1
Added
Reference
https://access.redhat.com/articles/2548661
Added
Reference
https://access.redhat.com/errata/RHSA-2017:1216
Added
Reference
https://access.redhat.com/errata/RHSA-2017:2708
Added
Reference
https://access.redhat.com/errata/RHSA-2017:2709
Added
Reference
https://access.redhat.com/errata/RHSA-2017:2710
Added
Reference
https://access.redhat.com/errata/RHSA-2017:3113
Added
Reference
https://access.redhat.com/errata/RHSA-2017:3114
Added
Reference
https://access.redhat.com/errata/RHSA-2017:3239
Added
Reference
https://access.redhat.com/errata/RHSA-2017:3240
Added
Reference
https://access.redhat.com/errata/RHSA-2018:2123
Added
Reference
https://access.redhat.com/errata/RHSA-2019:1245
Added
Reference
https://access.redhat.com/errata/RHSA-2019:2859
Added
Reference
https://access.redhat.com/errata/RHSA-2020:0451
Added
Reference
https://access.redhat.com/security/cve/cve-2016-2183
Added
Reference
https://blog.cryptographyengineering.com/2016/08/24/attack-of-week-64-bit-ciphers-in-tls/
Added
Reference
https://bto.bluecoat.com/security-advisory/sa133
Added
Reference
https://bugzilla.redhat.com/show_bug.cgi?id=1369383
Added
Reference
https://cert-portal.siemens.com/productcert/pdf/ssa-412672.pdf
Added
Reference
https://github.com/ssllabs/ssllabs-scan/issues/387#issuecomment-242514633
Added
Reference
https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c05302448
Added
Reference
https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c05369403
Added
Reference
https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c05369415
Added
Reference
https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c05385680
Added
Reference
https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c05390722
Added
Reference
https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c05390849
Added
Reference
https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbgn03765en_us
Added
Reference
https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03725en_us
Added
Reference
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05302448
Added
Reference
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05309984
Added
Reference
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05323116
Added
Reference
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05349499
Added
Reference
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05356388
Added
Reference
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05369403
Added
Reference
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05369415
Added
Reference
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05385680
Added
Reference
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722
Added
Reference
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390849
Added
Reference
https://ics-cert.us-cert.gov/advisories/ICSMA-18-058-02
Added
Reference
https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA40312
Added
Reference
https://kc.mcafee.com/corporate/index?page=content&id=SB10171
Added
Reference
https://kc.mcafee.com/corporate/index?page=content&id=SB10186
Added
Reference
https://kc.mcafee.com/corporate/index?page=content&id=SB10197
Added
Reference
https://kc.mcafee.com/corporate/index?page=content&id=SB10215
Added
Reference
https://kc.mcafee.com/corporate/index?page=content&id=SB10310
Added
Reference
https://nakedsecurity.sophos.com/2016/08/25/anatomy-of-a-cryptographic-collision-the-sweet32-attack/
Added
Reference
https://nodejs.org/en/blog/vulnerability/september-2016-security-releases/
Added
Reference
https://seclists.org/bugtraq/2018/Nov/21
Added
Reference
https://security.gentoo.org/glsa/201612-16
Added
Reference
https://security.gentoo.org/glsa/201701-65
Added
Reference
https://security.gentoo.org/glsa/201707-01
Added
Reference
https://security.netapp.com/advisory/ntap-20160915-0001/
Added
Reference
https://security.netapp.com/advisory/ntap-20170119-0001/
Added
Reference
https://softwaresupport.softwaregrp.com/document/-/facetsearch/document/KM03158613
Added
Reference
https://softwaresupport.softwaregrp.com/document/-/facetsearch/document/KM03286178
Added
Reference
https://support.f5.com/csp/article/K13167034
Added
Reference
https://sweet32.info/
Added
Reference
https://wiki.opendaylight.org/view/Security_Advisories
Added
Reference
https://www.arista.com/en/support/advisories-notices/security-advisories/1749-security-advisory-24
Added
Reference
https://www.exploit-db.com/exploits/42091/
Added
Reference
https://www.ietf.org/mail-archive/web/tls/current/msg04560.html
Added
Reference
https://www.mitel.com/en-ca/support/security-advisories/mitel-product-security-advisory-17-0008
Added
Reference
https://www.nccgroup.trust/us/about-us/newsroom-and-events/blog/2016/august/new-practical-attacks-on-64-bit-block-ciphers-3des-blowfish/
Added
Reference
https://www.openssl.org/blog/blog/2016/08/24/sweet32/
Added
Reference
https://www.oracle.com/security-alerts/cpuapr2020.html
Added
Reference
https://www.oracle.com/security-alerts/cpujan2020.html
Added
Reference
https://www.oracle.com/security-alerts/cpujul2020.html
Added
Reference
https://www.oracle.com/security-alerts/cpuoct2020.html
Added
Reference
https://www.oracle.com/security-alerts/cpuoct2021.html
Added
Reference
https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html
Added
Reference
https://www.sigsac.org/ccs/CCS2016/accepted-papers/
Added
Reference
https://www.tenable.com/security/tns-2016-16
Added
Reference
https://www.tenable.com/security/tns-2016-20
Added
Reference
https://www.tenable.com/security/tns-2016-21
Added
Reference
https://www.tenable.com/security/tns-2017-09
Added
Reference
https://www.teskalabs.com/blog/teskalabs-bulletin-160826-seacat-sweet32-issue
CVE Modified by Red Hat, Inc. 5/13/2024 11:54:27 PM
Action
Type
Old Value
New Value
CVE Modified by Red Hat, Inc. 2/12/2023 6:17:38 PM
Action
Type
Old Value
New Value
Changed
Description
A flaw was found in the way the DES/3DES cipher was used as part of the TLS/SSL protocol. A man-in-the-middle attacker could use this flaw to recover some plaintext data by capturing large amounts of encrypted traffic between TLS/SSL server and client if the communication used a DES/3DES based ciphersuite.
The DES and Triple DES ciphers, as used in the TLS, SSH, and IPSec protocols and other protocols and products, have a birthday bound of approximately four billion blocks, which makes it easier for remote attackers to obtain cleartext data via a birthday attack against a long-duration encrypted session, as demonstrated by an HTTPS session using Triple DES in CBC mode, aka a "Sweet32" attack.
Removed
CVSS V3
Red Hat, Inc. AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
Removed
CVSS V2
Red Hat, Inc. (AV:N/AC:M/Au:N/C:P/I:N/A:N)
Removed
Reference
https://access.redhat.com/errata/RHBA-2019:2581 [No Types Assigned]
Removed
Reference
https://access.redhat.com/errata/RHSA-2016:1940 [No Types Assigned]
Removed
Reference
https://access.redhat.com/errata/RHSA-2017:0336 [No Types Assigned]
Removed
Reference
https://access.redhat.com/errata/RHSA-2017:0337 [No Types Assigned]
Removed
Reference
https://access.redhat.com/errata/RHSA-2017:0338 [No Types Assigned]
Removed
Reference
https://access.redhat.com/errata/RHSA-2017:0462 [No Types Assigned]
Removed
Reference
https://access.redhat.com/errata/RHSA-2020:3842 [No Types Assigned]
Removed
Reference
https://access.redhat.com/errata/RHSA-2021:0308 [No Types Assigned]
Removed
Reference
https://access.redhat.com/errata/RHSA-2021:2438 [No Types Assigned]
Removed
Reference
https://access.redhat.com/security/cve/CVE-2016-2183 [Third Party Advisory]
CVE Modified by Red Hat, Inc. 2/02/2023 4:16:33 PM
Action
Type
Old Value
New Value
Changed
Description
The DES and Triple DES ciphers, as used in the TLS, SSH, and IPSec protocols and other protocols and products, have a birthday bound of approximately four billion blocks, which makes it easier for remote attackers to obtain cleartext data via a birthday attack against a long-duration encrypted session, as demonstrated by an HTTPS session using Triple DES in CBC mode, aka a "Sweet32" attack.
A flaw was found in the way the DES/3DES cipher was used as part of the TLS/SSL protocol. A man-in-the-middle attacker could use this flaw to recover some plaintext data by capturing large amounts of encrypted traffic between TLS/SSL server and client if the communication used a DES/3DES based ciphersuite.
Added
CVSS V3
Red Hat, Inc. AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
Added
CVSS V2
Red Hat, Inc. (AV:N/AC:M/Au:N/C:P/I:N/A:N)
Added
Reference
https://access.redhat.com/errata/RHBA-2019:2581 [No Types Assigned]
Added
Reference
https://access.redhat.com/errata/RHSA-2016:1940 [No Types Assigned]
Added
Reference
https://access.redhat.com/errata/RHSA-2017:0336 [No Types Assigned]
Added
Reference
https://access.redhat.com/errata/RHSA-2017:0337 [No Types Assigned]
Added
Reference
https://access.redhat.com/errata/RHSA-2017:0338 [No Types Assigned]
Added
Reference
https://access.redhat.com/errata/RHSA-2017:0462 [No Types Assigned]
Added
Reference
https://access.redhat.com/errata/RHSA-2020:3842 [No Types Assigned]
Added
Reference
https://access.redhat.com/errata/RHSA-2021:0308 [No Types Assigned]
Added
Reference
https://access.redhat.com/errata/RHSA-2021:2438 [No Types Assigned]
Added
Reference
https://access.redhat.com/security/cve/CVE-2016-2183 [No Types Assigned]
CVE Modified by Red Hat, Inc. 12/13/2022 7:15:22 AM
Action
Type
Old Value
New Value
Added
Reference
https://cert-portal.siemens.com/productcert/pdf/ssa-412672.pdf [No Types Assigned]
Reanalysis by NIST 8/16/2022 9:17:26 AM
Action
Type
Old Value
New Value
Added
CPE Configuration
OR
*cpe:2.3:a:nodejs:node.js:*:*:*:*:*:*:*:* versions from (including) 0.10.0 up to (excluding) 0.10.47
*cpe:2.3:a:nodejs:node.js:*:*:*:*:*:*:*:* versions from (including) 0.12.0 up to (excluding) 0.12.16
*cpe:2.3:a:nodejs:node.js:*:*:*:*:-:*:*:* versions from (including) 4.0.0 up to (excluding) 4.1.2
*cpe:2.3:a:nodejs:node.js:*:*:*:*:lts:*:*:* versions from (including) 4.2.0 up to (excluding) 4.6.0
*cpe:2.3:a:nodejs:node.js:*:*:*:*:-:*:*:* versions from (including) 6.0.0 up to (excluding) 6.7.0
Modified Analysis by NIST 7/28/2022 7:27:26 AM
Action
Type
Old Value
New Value
Added
CVSS V3.1
NIST AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
Removed
CVSS V3
NIST AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
Changed
CPE Configuration
OR
*cpe:2.3:a:python:python:3.3:*:*:*:*:*:*:*
*cpe:2.3:a:python:python:3.4.0:*:*:*:*:*:*:*
*cpe:2.3:a:python:python:3.5.0:*:*:*:*:*:*:*
*cpe:2.3:a:python:python:3.6.0:*:*:*:*:*:*:*
OR
*cpe:2.3:a:python:python:*:*:*:*:*:*:*:* versions from (including) 2.7.0 up to (excluding) 2.7.13
*cpe:2.3:a:python:python:*:*:*:*:*:*:*:* versions from (including) 3.4.0 up to (excluding) 3.4.7
*cpe:2.3:a:python:python:*:*:*:*:*:*:*:* versions from (including) 3.5.0 up to (excluding) 3.5.3
Changed
Reference Type
http://lists.opensuse.org/opensuse-security-announce/2016-09/msg00022.html No Types Assigned
http://lists.opensuse.org/opensuse-security-announce/2016-09/msg00022.html Mailing List, Third Party Advisory
Changed
Reference Type
http://lists.opensuse.org/opensuse-security-announce/2016-09/msg00023.html No Types Assigned
http://lists.opensuse.org/opensuse-security-announce/2016-09/msg00023.html Mailing List, Third Party Advisory
Changed
Reference Type
http://lists.opensuse.org/opensuse-security-announce/2016-09/msg00024.html No Types Assigned
http://lists.opensuse.org/opensuse-security-announce/2016-09/msg00024.html Mailing List, Third Party Advisory
Changed
Reference Type
http://lists.opensuse.org/opensuse-security-announce/2016-09/msg00031.html No Types Assigned
http://lists.opensuse.org/opensuse-security-announce/2016-09/msg00031.html Mailing List, Third Party Advisory
Changed
Reference Type
http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00005.html No Types Assigned
http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00005.html Mailing List, Third Party Advisory
Changed
Reference Type
http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00011.html No Types Assigned
http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00011.html Mailing List, Third Party Advisory
Changed
Reference Type
http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00012.html No Types Assigned
http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00012.html Mailing List, Third Party Advisory
Changed
Reference Type
http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00021.html No Types Assigned
http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00021.html Mailing List, Third Party Advisory
Changed
Reference Type
http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00029.html No Types Assigned
http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00029.html Mailing List, Third Party Advisory
Changed
Reference Type
http://lists.opensuse.org/opensuse-security-announce/2017-01/msg00068.html No Types Assigned
http://lists.opensuse.org/opensuse-security-announce/2017-01/msg00068.html Mailing List, Third Party Advisory
Changed
Reference Type
http://lists.opensuse.org/opensuse-security-announce/2017-02/msg00003.html No Types Assigned
http://lists.opensuse.org/opensuse-security-announce/2017-02/msg00003.html Mailing List, Third Party Advisory
Changed
Reference Type
http://lists.opensuse.org/opensuse-security-announce/2017-02/msg00023.html No Types Assigned
http://lists.opensuse.org/opensuse-security-announce/2017-02/msg00023.html Mailing List, Third Party Advisory
Changed
Reference Type
http://lists.opensuse.org/opensuse-security-announce/2017-02/msg00028.html No Types Assigned
http://lists.opensuse.org/opensuse-security-announce/2017-02/msg00028.html Mailing List, Third Party Advisory
Changed
Reference Type
http://lists.opensuse.org/opensuse-security-announce/2017-02/msg00032.html No Types Assigned
http://lists.opensuse.org/opensuse-security-announce/2017-02/msg00032.html Mailing List, Third Party Advisory
Changed
Reference Type
http://lists.opensuse.org/opensuse-security-announce/2017-05/msg00076.html No Types Assigned
http://lists.opensuse.org/opensuse-security-announce/2017-05/msg00076.html Mailing List, Third Party Advisory
Changed
Reference Type
http://lists.opensuse.org/opensuse-security-announce/2017-10/msg00010.html No Types Assigned
http://lists.opensuse.org/opensuse-security-announce/2017-10/msg00010.html Mailing List, Third Party Advisory
Changed
Reference Type
http://lists.opensuse.org/opensuse-security-announce/2017-10/msg00011.html No Types Assigned
http://lists.opensuse.org/opensuse-security-announce/2017-10/msg00011.html Mailing List, Third Party Advisory
Changed
Reference Type
http://lists.opensuse.org/opensuse-security-announce/2018-02/msg00032.html No Types Assigned
http://lists.opensuse.org/opensuse-security-announce/2018-02/msg00032.html Mailing List, Third Party Advisory
Changed
Reference Type
http://packetstormsecurity.com/files/142756/IBM-Informix-Dynamic-Server-DLL-Injection-Code-Execution.html No Types Assigned
http://packetstormsecurity.com/files/142756/IBM-Informix-Dynamic-Server-DLL-Injection-Code-Execution.html Third Party Advisory, VDB Entry
Changed
Reference Type
http://seclists.org/fulldisclosure/2017/Jul/31 No Types Assigned
http://seclists.org/fulldisclosure/2017/Jul/31 Mailing List, Third Party Advisory
Changed
Reference Type
http://seclists.org/fulldisclosure/2017/May/105 No Types Assigned
http://seclists.org/fulldisclosure/2017/May/105 Mailing List, Third Party Advisory
Changed
Reference Type
http://www.debian.org/security/2016/dsa-3673 No Types Assigned
http://www.debian.org/security/2016/dsa-3673 Third Party Advisory
Changed
Reference Type
http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20170322-01-openssl-en No Types Assigned
http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20170322-01-openssl-en Third Party Advisory
Changed
Reference Type
http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html No Types Assigned
http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html Patch, Third Party Advisory
Changed
Reference Type
http://www.securityfocus.com/archive/1/539885/100/0/threaded No Types Assigned
http://www.securityfocus.com/archive/1/539885/100/0/threaded Third Party Advisory, VDB Entry
Changed
Reference Type
http://www.securityfocus.com/archive/1/540341/100/0/threaded No Types Assigned
http://www.securityfocus.com/archive/1/540341/100/0/threaded Third Party Advisory, VDB Entry
Changed
Reference Type
http://www.securityfocus.com/archive/1/541104/100/0/threaded No Types Assigned
http://www.securityfocus.com/archive/1/541104/100/0/threaded Third Party Advisory, VDB Entry
Changed
Reference Type
http://www.securityfocus.com/archive/1/542005/100/0/threaded No Types Assigned
http://www.securityfocus.com/archive/1/542005/100/0/threaded Third Party Advisory, VDB Entry
Changed
Reference Type
http://www.securityfocus.com/archive/1/archive/1/539885/100/0/threaded No Types Assigned
http://www.securityfocus.com/archive/1/archive/1/539885/100/0/threaded Third Party Advisory, VDB Entry
Changed
Reference Type
http://www.securityfocus.com/archive/1/archive/1/540129/100/0/threaded No Types Assigned
http://www.securityfocus.com/archive/1/archive/1/540129/100/0/threaded Third Party Advisory, VDB Entry
Changed
Reference Type
http://www.securityfocus.com/archive/1/archive/1/540341/100/0/threaded No Types Assigned
http://www.securityfocus.com/archive/1/archive/1/540341/100/0/threaded Third Party Advisory, VDB Entry
Changed
Reference Type
http://www.securityfocus.com/archive/1/archive/1/541104/100/0/threaded No Types Assigned
http://www.securityfocus.com/archive/1/archive/1/541104/100/0/threaded Third Party Advisory, VDB Entry
Changed
Reference Type
http://www.securityfocus.com/archive/1/archive/1/542005/100/0/threaded No Types Assigned
http://www.securityfocus.com/archive/1/archive/1/542005/100/0/threaded Third Party Advisory, VDB Entry
Changed
Reference Type
http://www.ubuntu.com/usn/USN-3087-1 No Types Assigned
http://www.ubuntu.com/usn/USN-3087-1 Third Party Advisory
Changed
Reference Type
http://www.ubuntu.com/usn/USN-3087-2 No Types Assigned
http://www.ubuntu.com/usn/USN-3087-2 Third Party Advisory
Changed
Reference Type
http://www.ubuntu.com/usn/USN-3179-1 No Types Assigned
http://www.ubuntu.com/usn/USN-3179-1 Third Party Advisory
Changed
Reference Type
http://www.ubuntu.com/usn/USN-3194-1 No Types Assigned
http://www.ubuntu.com/usn/USN-3194-1 Third Party Advisory
Changed
Reference Type
http://www.ubuntu.com/usn/USN-3198-1 No Types Assigned
http://www.ubuntu.com/usn/USN-3198-1 Third Party Advisory
Changed
Reference Type
http://www.ubuntu.com/usn/USN-3270-1 No Types Assigned
http://www.ubuntu.com/usn/USN-3270-1 Third Party Advisory
Changed
Reference Type
http://www.ubuntu.com/usn/USN-3372-1 No Types Assigned
http://www.ubuntu.com/usn/USN-3372-1 Third Party Advisory
Changed
Reference Type
https://access.redhat.com/errata/RHSA-2018:2123 No Types Assigned
https://access.redhat.com/errata/RHSA-2018:2123 Third Party Advisory
Changed
Reference Type
https://access.redhat.com/errata/RHSA-2019:1245 No Types Assigned
https://access.redhat.com/errata/RHSA-2019:1245 Third Party Advisory
Changed
Reference Type
https://access.redhat.com/errata/RHSA-2019:2859 No Types Assigned
https://access.redhat.com/errata/RHSA-2019:2859 Third Party Advisory
Changed
Reference Type
https://access.redhat.com/errata/RHSA-2020:0451 No Types Assigned
https://access.redhat.com/errata/RHSA-2020:0451 Third Party Advisory
Changed
Reference Type
https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c05302448 No Types Assigned
https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c05302448 Third Party Advisory
Changed
Reference Type
https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c05369403 No Types Assigned
https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c05369403 Third Party Advisory
Changed
Reference Type
https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c05369415 No Types Assigned
https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c05369415 Third Party Advisory
Changed
Reference Type
https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c05385680 No Types Assigned
https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c05385680 Third Party Advisory
Changed
Reference Type
https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c05390722 No Types Assigned
https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c05390722 Third Party Advisory
Changed
Reference Type
https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c05390849 No Types Assigned
https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c05390849 Third Party Advisory
Changed
Reference Type
https://ics-cert.us-cert.gov/advisories/ICSMA-18-058-02 No Types Assigned
https://ics-cert.us-cert.gov/advisories/ICSMA-18-058-02 Third Party Advisory, US Government Resource
Changed
Reference Type
https://kc.mcafee.com/corporate/index?page=content&id=SB10186 No Types Assigned
https://kc.mcafee.com/corporate/index?page=content&id=SB10186 Third Party Advisory
Changed
Reference Type
https://kc.mcafee.com/corporate/index?page=content&id=SB10197 No Types Assigned
https://kc.mcafee.com/corporate/index?page=content&id=SB10197 Third Party Advisory
Changed
Reference Type
https://kc.mcafee.com/corporate/index?page=content&id=SB10215 No Types Assigned
https://kc.mcafee.com/corporate/index?page=content&id=SB10215 Third Party Advisory
Changed
Reference Type
https://kc.mcafee.com/corporate/index?page=content&id=SB10310 No Types Assigned
https://kc.mcafee.com/corporate/index?page=content&id=SB10310 Third Party Advisory
Changed
Reference Type
https://seclists.org/bugtraq/2018/Nov/21 No Types Assigned
https://seclists.org/bugtraq/2018/Nov/21 Mailing List, Third Party Advisory
Changed
Reference Type
https://softwaresupport.softwaregrp.com/document/-/facetsearch/document/KM03158613 No Types Assigned
https://softwaresupport.softwaregrp.com/document/-/facetsearch/document/KM03158613 Third Party Advisory
Changed
Reference Type
https://softwaresupport.softwaregrp.com/document/-/facetsearch/document/KM03286178 No Types Assigned
https://softwaresupport.softwaregrp.com/document/-/facetsearch/document/KM03286178 Third Party Advisory
Changed
Reference Type
https://support.f5.com/csp/article/K13167034 No Types Assigned
https://support.f5.com/csp/article/K13167034 Third Party Advisory
Changed
Reference Type
https://wiki.opendaylight.org/view/Security_Advisories No Types Assigned
https://wiki.opendaylight.org/view/Security_Advisories Third Party Advisory
Changed
Reference Type
https://www.arista.com/en/support/advisories-notices/security-advisories/1749-security-advisory-24 No Types Assigned
https://www.arista.com/en/support/advisories-notices/security-advisories/1749-security-advisory-24 Third Party Advisory
Changed
Reference Type
https://www.exploit-db.com/exploits/42091/ No Types Assigned
https://www.exploit-db.com/exploits/42091/ Third Party Advisory, VDB Entry
Changed
Reference Type
https://www.mitel.com/en-ca/support/security-advisories/mitel-product-security-advisory-17-0008 No Types Assigned
https://www.mitel.com/en-ca/support/security-advisories/mitel-product-security-advisory-17-0008 Third Party Advisory
Changed
Reference Type
https://www.oracle.com/security-alerts/cpuapr2020.html No Types Assigned
https://www.oracle.com/security-alerts/cpuapr2020.html Third Party Advisory
Changed
Reference Type
https://www.oracle.com/security-alerts/cpujan2020.html No Types Assigned
https://www.oracle.com/security-alerts/cpujan2020.html Third Party Advisory
Changed
Reference Type
https://www.oracle.com/security-alerts/cpujul2020.html No Types Assigned
https://www.oracle.com/security-alerts/cpujul2020.html Third Party Advisory
Changed
Reference Type
https://www.oracle.com/security-alerts/cpuoct2020.html No Types Assigned
https://www.oracle.com/security-alerts/cpuoct2020.html Third Party Advisory
Changed
Reference Type
https://www.oracle.com/security-alerts/cpuoct2021.html No Types Assigned
https://www.oracle.com/security-alerts/cpuoct2021.html Third Party Advisory
Changed
Reference Type
https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html No Types Assigned
https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html Patch, Third Party Advisory
CVE Modified by Red Hat, Inc. 11/17/2021 5:15:52 PM
Action
Type
Old Value
New Value
Added
Reference
http://lists.opensuse.org/opensuse-security-announce/2016-09/msg00022.html [No Types Assigned]
Added
Reference
http://lists.opensuse.org/opensuse-security-announce/2016-09/msg00023.html [No Types Assigned]
Added
Reference
http://lists.opensuse.org/opensuse-security-announce/2016-09/msg00024.html [No Types Assigned]
Added
Reference
http://lists.opensuse.org/opensuse-security-announce/2016-09/msg00031.html [No Types Assigned]
Added
Reference
http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00005.html [No Types Assigned]
Added
Reference
http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00011.html [No Types Assigned]
Added
Reference
http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00012.html [No Types Assigned]
Added
Reference
http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00021.html [No Types Assigned]
Added
Reference
http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00029.html [No Types Assigned]
Added
Reference
http://lists.opensuse.org/opensuse-security-announce/2017-01/msg00068.html [No Types Assigned]
Added
Reference
http://lists.opensuse.org/opensuse-security-announce/2017-02/msg00003.html [No Types Assigned]
Added
Reference
http://lists.opensuse.org/opensuse-security-announce/2017-02/msg00023.html [No Types Assigned]
Added
Reference
http://lists.opensuse.org/opensuse-security-announce/2017-02/msg00028.html [No Types Assigned]
Added
Reference
http://lists.opensuse.org/opensuse-security-announce/2017-02/msg00032.html [No Types Assigned]
Added
Reference
http://lists.opensuse.org/opensuse-security-announce/2017-05/msg00076.html [No Types Assigned]
Added
Reference
http://lists.opensuse.org/opensuse-security-announce/2017-10/msg00010.html [No Types Assigned]
Added
Reference
http://lists.opensuse.org/opensuse-security-announce/2017-10/msg00011.html [No Types Assigned]
Added
Reference
http://lists.opensuse.org/opensuse-security-announce/2018-02/msg00032.html [No Types Assigned]
Added
Reference
http://packetstormsecurity.com/files/142756/IBM-Informix-Dynamic-Server-DLL-Injection-Code-Execution.html [No Types Assigned]
Added
Reference
http://seclists.org/fulldisclosure/2017/Jul/31 [No Types Assigned]
Added
Reference
http://seclists.org/fulldisclosure/2017/May/105 [No Types Assigned]
Added
Reference
http://www.debian.org/security/2016/dsa-3673 [No Types Assigned]
Added
Reference
http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20170322-01-openssl-en [No Types Assigned]
Added
Reference
http://www.securityfocus.com/archive/1/539885/100/0/threaded [No Types Assigned]
Added
Reference
http://www.securityfocus.com/archive/1/540341/100/0/threaded [No Types Assigned]
Added
Reference
http://www.securityfocus.com/archive/1/541104/100/0/threaded [No Types Assigned]
Added
Reference
http://www.securityfocus.com/archive/1/542005/100/0/threaded [No Types Assigned]
Added
Reference
http://www.securityfocus.com/archive/1/archive/1/539885/100/0/threaded [No Types Assigned]
Added
Reference
http://www.securityfocus.com/archive/1/archive/1/540129/100/0/threaded [No Types Assigned]
Added
Reference
http://www.securityfocus.com/archive/1/archive/1/540341/100/0/threaded [No Types Assigned]
Added
Reference
http://www.securityfocus.com/archive/1/archive/1/541104/100/0/threaded [No Types Assigned]
Added
Reference
http://www.securityfocus.com/archive/1/archive/1/542005/100/0/threaded [No Types Assigned]
Added
Reference
http://www.ubuntu.com/usn/USN-3087-1 [No Types Assigned]
Added
Reference
http://www.ubuntu.com/usn/USN-3087-2 [No Types Assigned]
Added
Reference
http://www.ubuntu.com/usn/USN-3179-1 [No Types Assigned]
Added
Reference
http://www.ubuntu.com/usn/USN-3194-1 [No Types Assigned]
Added
Reference
http://www.ubuntu.com/usn/USN-3198-1 [No Types Assigned]
Added
Reference
http://www.ubuntu.com/usn/USN-3270-1 [No Types Assigned]
Added
Reference
http://www.ubuntu.com/usn/USN-3372-1 [No Types Assigned]
Added
Reference
https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c05302448 [No Types Assigned]
Added
Reference
https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c05369403 [No Types Assigned]
Added
Reference
https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c05369415 [No Types Assigned]
Added
Reference
https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c05385680 [No Types Assigned]
Added
Reference
https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c05390722 [No Types Assigned]
Added
Reference
https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c05390849 [No Types Assigned]
Added
Reference
https://kc.mcafee.com/corporate/index?page=content&id=SB10186 [No Types Assigned]
Added
Reference
https://kc.mcafee.com/corporate/index?page=content&id=SB10197 [No Types Assigned]
Added
Reference
https://kc.mcafee.com/corporate/index?page=content&id=SB10215 [No Types Assigned]
Added
Reference
https://seclists.org/bugtraq/2018/Nov/21 [No Types Assigned]
Added
Reference
https://softwaresupport.softwaregrp.com/document/-/facetsearch/document/KM03158613 [No Types Assigned]
Added
Reference
https://softwaresupport.softwaregrp.com/document/-/facetsearch/document/KM03286178 [No Types Assigned]
Added
Reference
https://support.f5.com/csp/article/K13167034 [No Types Assigned]
Added
Reference
https://wiki.opendaylight.org/view/Security_Advisories [No Types Assigned]
Added
Reference
https://www.arista.com/en/support/advisories-notices/security-advisories/1749-security-advisory-24 [No Types Assigned]
Added
Reference
https://www.exploit-db.com/exploits/42091/ [No Types Assigned]
CVE Modified by Red Hat, Inc. 11/09/2021 8:15:27 PM
Action
Type
Old Value
New Value
Removed
Reference
http://lists.opensuse.org/opensuse-security-announce/2016-09/msg00022.html [No Types Assigned]
Removed
Reference
http://lists.opensuse.org/opensuse-security-announce/2016-09/msg00023.html [No Types Assigned]
Removed
Reference
http://lists.opensuse.org/opensuse-security-announce/2016-09/msg00024.html [No Types Assigned]
Removed
Reference
http://lists.opensuse.org/opensuse-security-announce/2016-09/msg00031.html [No Types Assigned]
Removed
Reference
http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00005.html [No Types Assigned]
Removed
Reference
http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00011.html [No Types Assigned]
Removed
Reference
http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00012.html [No Types Assigned]
Removed
Reference
http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00021.html [No Types Assigned]
Removed
Reference
http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00029.html [No Types Assigned]
Removed
Reference
http://lists.opensuse.org/opensuse-security-announce/2017-01/msg00068.html [No Types Assigned]
Removed
Reference
http://lists.opensuse.org/opensuse-security-announce/2017-02/msg00003.html [No Types Assigned]
Removed
Reference
http://lists.opensuse.org/opensuse-security-announce/2017-02/msg00023.html [No Types Assigned]
Removed
Reference
http://lists.opensuse.org/opensuse-security-announce/2017-02/msg00028.html [No Types Assigned]
Removed
Reference
http://lists.opensuse.org/opensuse-security-announce/2017-02/msg00032.html [No Types Assigned]
Removed
Reference
http://lists.opensuse.org/opensuse-security-announce/2017-05/msg00076.html [No Types Assigned]
Removed
Reference
http://lists.opensuse.org/opensuse-security-announce/2017-10/msg00010.html [No Types Assigned]
Removed
Reference
http://lists.opensuse.org/opensuse-security-announce/2017-10/msg00011.html [No Types Assigned]
Removed
Reference
http://lists.opensuse.org/opensuse-security-announce/2018-02/msg00032.html [No Types Assigned]
Removed
Reference
http://packetstormsecurity.com/files/142756/IBM-Informix-Dynamic-Server-DLL-Injection-Code-Execution.html [No Types Assigned]
Removed
Reference
http://seclists.org/fulldisclosure/2017/Jul/31 [No Types Assigned]
Removed
Reference
http://seclists.org/fulldisclosure/2017/May/105 [No Types Assigned]
Removed
Reference
http://www.debian.org/security/2016/dsa-3673 [No Types Assigned]
Removed
Reference
http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20170322-01-openssl-en [No Types Assigned]
Removed
Reference
http://www.securityfocus.com/archive/1/539885/100/0/threaded [No Types Assigned]
Removed
Reference
http://www.securityfocus.com/archive/1/540341/100/0/threaded [No Types Assigned]
Removed
Reference
http://www.securityfocus.com/archive/1/541104/100/0/threaded [No Types Assigned]
Removed
Reference
http://www.securityfocus.com/archive/1/542005/100/0/threaded [No Types Assigned]
Removed
Reference
http://www.securityfocus.com/archive/1/archive/1/539885/100/0/threaded [No Types Assigned]
Removed
Reference
http://www.securityfocus.com/archive/1/archive/1/540129/100/0/threaded [No Types Assigned]
Removed
Reference
http://www.securityfocus.com/archive/1/archive/1/540341/100/0/threaded [No Types Assigned]
Removed
Reference
http://www.securityfocus.com/archive/1/archive/1/541104/100/0/threaded [No Types Assigned]
Removed
Reference
http://www.securityfocus.com/archive/1/archive/1/542005/100/0/threaded [No Types Assigned]
Removed
Reference
http://www.ubuntu.com/usn/USN-3087-1 [No Types Assigned]
Removed
Reference
http://www.ubuntu.com/usn/USN-3087-2 [No Types Assigned]
Removed
Reference
http://www.ubuntu.com/usn/USN-3179-1 [No Types Assigned]
Removed
Reference
http://www.ubuntu.com/usn/USN-3194-1 [No Types Assigned]
Removed
Reference
http://www.ubuntu.com/usn/USN-3198-1 [No Types Assigned]
Removed
Reference
http://www.ubuntu.com/usn/USN-3270-1 [No Types Assigned]
Removed
Reference
http://www.ubuntu.com/usn/USN-3372-1 [No Types Assigned]
Removed
Reference
https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c05302448 [No Types Assigned]
Removed
Reference
https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c05369403 [No Types Assigned]
Removed
Reference
https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c05369415 [No Types Assigned]
Removed
Reference
https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c05385680 [No Types Assigned]
Removed
Reference
https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c05390722 [No Types Assigned]
Removed
Reference
https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c05390849 [No Types Assigned]
Removed
Reference
https://kc.mcafee.com/corporate/index?page=content&id=SB10186 [No Types Assigned]
Removed
Reference
https://kc.mcafee.com/corporate/index?page=content&id=SB10197 [No Types Assigned]
Removed
Reference
https://kc.mcafee.com/corporate/index?page=content&id=SB10215 [No Types Assigned]
Removed
Reference
https://seclists.org/bugtraq/2018/Nov/21 [No Types Assigned]
Removed
Reference
https://softwaresupport.softwaregrp.com/document/-/facetsearch/document/KM03158613 [No Types Assigned]
Removed
Reference
https://softwaresupport.softwaregrp.com/document/-/facetsearch/document/KM03286178 [No Types Assigned]
Removed
Reference
https://support.f5.com/csp/article/K13167034 [No Types Assigned]
Removed
Reference
https://wiki.opendaylight.org/view/Security_Advisories [No Types Assigned]
Removed
Reference
https://www.arista.com/en/support/advisories-notices/security-advisories/1749-security-advisory-24 [No Types Assigned]
Removed
Reference
https://www.exploit-db.com/exploits/42091/ [No Types Assigned]
CVE Modified by Red Hat, Inc. 11/08/2021 7:15:08 AM
Action
Type
Old Value
New Value
Added
Reference
http://lists.opensuse.org/opensuse-security-announce/2016-09/msg00022.html [No Types Assigned]
Added
Reference
http://lists.opensuse.org/opensuse-security-announce/2016-09/msg00023.html [No Types Assigned]
Added
Reference
http://lists.opensuse.org/opensuse-security-announce/2016-09/msg00024.html [No Types Assigned]
Added
Reference
http://lists.opensuse.org/opensuse-security-announce/2016-09/msg00031.html [No Types Assigned]
Added
Reference
http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00005.html [No Types Assigned]
Added
Reference
http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00011.html [No Types Assigned]
Added
Reference
http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00012.html [No Types Assigned]
Added
Reference
http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00021.html [No Types Assigned]
Added
Reference
http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00029.html [No Types Assigned]
Added
Reference
http://lists.opensuse.org/opensuse-security-announce/2017-01/msg00068.html [No Types Assigned]
Added
Reference
http://lists.opensuse.org/opensuse-security-announce/2017-02/msg00003.html [No Types Assigned]
Added
Reference
http://lists.opensuse.org/opensuse-security-announce/2017-02/msg00023.html [No Types Assigned]
Added
Reference
http://lists.opensuse.org/opensuse-security-announce/2017-02/msg00028.html [No Types Assigned]
Added
Reference
http://lists.opensuse.org/opensuse-security-announce/2017-02/msg00032.html [No Types Assigned]
Added
Reference
http://lists.opensuse.org/opensuse-security-announce/2017-05/msg00076.html [No Types Assigned]
Added
Reference
http://lists.opensuse.org/opensuse-security-announce/2017-10/msg00010.html [No Types Assigned]
Added
Reference
http://lists.opensuse.org/opensuse-security-announce/2017-10/msg00011.html [No Types Assigned]
Added
Reference
http://lists.opensuse.org/opensuse-security-announce/2018-02/msg00032.html [No Types Assigned]
Added
Reference
http://packetstormsecurity.com/files/142756/IBM-Informix-Dynamic-Server-DLL-Injection-Code-Execution.html [No Types Assigned]
Added
Reference
http://seclists.org/fulldisclosure/2017/Jul/31 [No Types Assigned]
Added
Reference
http://seclists.org/fulldisclosure/2017/May/105 [No Types Assigned]
Added
Reference
http://www.debian.org/security/2016/dsa-3673 [No Types Assigned]
Added
Reference
http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20170322-01-openssl-en [No Types Assigned]
Added
Reference
http://www.securityfocus.com/archive/1/539885/100/0/threaded [No Types Assigned]
Added
Reference
http://www.securityfocus.com/archive/1/540341/100/0/threaded [No Types Assigned]
Added
Reference
http://www.securityfocus.com/archive/1/541104/100/0/threaded [No Types Assigned]
Added
Reference
http://www.securityfocus.com/archive/1/542005/100/0/threaded [No Types Assigned]
Added
Reference
http://www.securityfocus.com/archive/1/archive/1/539885/100/0/threaded [No Types Assigned]
Added
Reference
http://www.securityfocus.com/archive/1/archive/1/540129/100/0/threaded [No Types Assigned]
Added
Reference
http://www.securityfocus.com/archive/1/archive/1/540341/100/0/threaded [No Types Assigned]
Added
Reference
http://www.securityfocus.com/archive/1/archive/1/541104/100/0/threaded [No Types Assigned]
Added
Reference
http://www.securityfocus.com/archive/1/archive/1/542005/100/0/threaded [No Types Assigned]
Added
Reference
http://www.ubuntu.com/usn/USN-3087-1 [No Types Assigned]
Added
Reference
http://www.ubuntu.com/usn/USN-3087-2 [No Types Assigned]
Added
Reference
http://www.ubuntu.com/usn/USN-3179-1 [No Types Assigned]
Added
Reference
http://www.ubuntu.com/usn/USN-3194-1 [No Types Assigned]
Added
Reference
http://www.ubuntu.com/usn/USN-3198-1 [No Types Assigned]
Added
Reference
http://www.ubuntu.com/usn/USN-3270-1 [No Types Assigned]
Added
Reference
http://www.ubuntu.com/usn/USN-3372-1 [No Types Assigned]
Added
Reference
https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c05302448 [No Types Assigned]
Added
Reference
https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c05369403 [No Types Assigned]
Added
Reference
https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c05369415 [No Types Assigned]
Added
Reference
https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c05385680 [No Types Assigned]
Added
Reference
https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c05390722 [No Types Assigned]
Added
Reference
https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c05390849 [No Types Assigned]
Added
Reference
https://kc.mcafee.com/corporate/index?page=content&id=SB10186 [No Types Assigned]
Added
Reference
https://kc.mcafee.com/corporate/index?page=content&id=SB10197 [No Types Assigned]
Added
Reference
https://kc.mcafee.com/corporate/index?page=content&id=SB10215 [No Types Assigned]
Added
Reference
https://seclists.org/bugtraq/2018/Nov/21 [No Types Assigned]
Added
Reference
https://softwaresupport.softwaregrp.com/document/-/facetsearch/document/KM03158613 [No Types Assigned]
Added
Reference
https://softwaresupport.softwaregrp.com/document/-/facetsearch/document/KM03286178 [No Types Assigned]
Added
Reference
https://support.f5.com/csp/article/K13167034 [No Types Assigned]
Added
Reference
https://wiki.opendaylight.org/view/Security_Advisories [No Types Assigned]
Added
Reference
https://www.arista.com/en/support/advisories-notices/security-advisories/1749-security-advisory-24 [No Types Assigned]
Added
Reference
https://www.exploit-db.com/exploits/42091/ [No Types Assigned]
CVE Modified by Red Hat, Inc. 10/20/2021 7:15:27 AM
Action
Type
Old Value
New Value
Added
Reference
https://www.oracle.com/security-alerts/cpuoct2021.html [No Types Assigned]
CPE Deprecation Remap by NIST 1/06/2021 11:11:17 AM
Action
Type
Old Value
New Value
Changed
CPE Configuration
OR
*cpe:2.3:a:python:python:3.6:*:*:*:*:*:*:*
OR
*cpe:2.3:a:python:python:3.6.0:*:*:*:*:*:*:*
CPE Deprecation Remap by NIST 1/06/2021 11:09:34 AM
Action
Type
Old Value
New Value
Changed
CPE Configuration
OR
*cpe:2.3:a:python:python:3.5:*:*:*:*:*:*:*
OR
*cpe:2.3:a:python:python:3.5.0:*:*:*:*:*:*:*
CVE Modified by Red Hat, Inc. 10/20/2020 6:15:18 PM
Action
Type
Old Value
New Value
Added
Reference
https://www.oracle.com/security-alerts/cpuoct2020.html [No Types Assigned]
CVE Modified by Red Hat, Inc. 7/14/2020 11:15:14 PM
Action
Type
Old Value
New Value
Added
Reference
https://www.oracle.com/security-alerts/cpujul2020.html [No Types Assigned]
CVE Modified by Red Hat, Inc. 4/15/2020 5:15:17 PM
Action
Type
Old Value
New Value
Added
Reference
https://www.oracle.com/security-alerts/cpuapr2020.html [No Types Assigned]
CVE Modified by Red Hat, Inc. 3/18/2020 4:15:12 AM
Action
Type
Old Value
New Value
Added
Reference
https://kc.mcafee.com/corporate/index?page=content&id=SB10310 [No Types Assigned]
CVE Modified by Red Hat, Inc. 2/19/2020 6:15:10 PM
Action
Type
Old Value
New Value
Added
Reference
https://access.redhat.com/errata/RHSA-2020:0451 [No Types Assigned]
CVE Modified by Red Hat, Inc. 1/15/2020 3:15:13 PM
Action
Type
Old Value
New Value
Added
Reference
https://www.oracle.com/security-alerts/cpujan2020.html [No Types Assigned]
CPE Deprecation Remap by NIST 10/25/2019 7:54:01 AM
Action
Type
Old Value
New Value
Changed
CPE Configuration
OR
*cpe:2.3:a:python:python:2.7:*:*:*:*:*:*:*
OR
*cpe:2.3:a:python:python:2.7.0:*:*:*:*:*:*:*
CVE Modified by Red Hat, Inc. 9/26/2019 11:15:10 PM
Action
Type
Old Value
New Value
Added
Reference
https://access.redhat.com/errata/RHSA-2019:2859 [No Types Assigned]
CVE Modified by Red Hat, Inc. 7/23/2019 7:15:20 PM
Action
Type
Old Value
New Value
Added
Reference
https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html [No Types Assigned]
CVE Modified by Red Hat, Inc. 5/20/2019 1:29:00 PM
Action
Type
Old Value
New Value
Added
Reference
https://access.redhat.com/errata/RHSA-2019:1245 [No Types Assigned]
CPE Deprecation Remap by NIST 4/22/2019 1:48:01 PM
Action
Type
Old Value
New Value
Changed
CPE Configuration
OR
*cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*
OR
*cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*
CVE Modified by Red Hat, Inc. 10/23/2018 5:29:21 PM
Action
Type
Old Value
New Value
Added
Reference
https://www.mitel.com/en-ca/support/security-advisories/mitel-product-security-advisory-17-0008 [No Types Assigned]
CVE Modified by Red Hat, Inc. 7/04/2018 9:29:00 PM
Action
Type
Old Value
New Value
Added
Reference
https://access.redhat.com/errata/RHSA-2018:2123 [No Types Assigned]
CVE Modified by Red Hat, Inc. 4/19/2018 9:29:16 PM
Action
Type
Old Value
New Value
Added
Reference
http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html [No Types Assigned]
CVE Modified by Red Hat, Inc. 3/27/2018 9:29:03 PM
Action
Type
Old Value
New Value
Added
Reference
https://ics-cert.us-cert.gov/advisories/ICSMA-18-058-02 [No Types Assigned]
Modified Analysis by NIST 2/21/2018 10:38:03 AM
Action
Type
Old Value
New Value
Changed
CVSS V3
AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
Added
CPE Configuration
OR
*cpe:2.3:a:oracle:database:11.2.0.4:*:*:*:*:*:*:*
*cpe:2.3:a:oracle:database:12.1.0.2:*:*:*:*:*:*:*
Changed
Reference Type
http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10759 No Types Assigned
http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10759 Third Party Advisory
Changed
Reference Type
http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00013.html No Types Assigned
http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00013.html Third Party Advisory
Changed
Reference Type
http://rhn.redhat.com/errata/RHSA-2017-0336.html No Types Assigned
http://rhn.redhat.com/errata/RHSA-2017-0336.html Third Party Advisory
Changed
Reference Type
http://rhn.redhat.com/errata/RHSA-2017-0337.html No Types Assigned
http://rhn.redhat.com/errata/RHSA-2017-0337.html Third Party Advisory
Changed
Reference Type
http://rhn.redhat.com/errata/RHSA-2017-0338.html No Types Assigned
http://rhn.redhat.com/errata/RHSA-2017-0338.html Third Party Advisory
Changed
Reference Type
http://rhn.redhat.com/errata/RHSA-2017-0462.html No Types Assigned
http://rhn.redhat.com/errata/RHSA-2017-0462.html Third Party Advisory
Changed
Reference Type
http://www-01.ibm.com/support/docview.wss?uid=nas8N1021697 No Types Assigned
http://www-01.ibm.com/support/docview.wss?uid=nas8N1021697 Third Party Advisory
Changed
Reference Type
http://www-01.ibm.com/support/docview.wss?uid=swg21991482 No Types Assigned
http://www-01.ibm.com/support/docview.wss?uid=swg21991482 Third Party Advisory
Changed
Reference Type
http://www-01.ibm.com/support/docview.wss?uid=swg21995039 No Types Assigned
http://www-01.ibm.com/support/docview.wss?uid=swg21995039 Third Party Advisory
Changed
Reference Type
http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html No Types Assigned
http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html Patch, Third Party Advisory
Changed
Reference Type
http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html No Types Assigned
http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html Patch, Third Party Advisory
Changed
Reference Type
http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html No Types Assigned
http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html Patch, Third Party Advisory
Changed
Reference Type
http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html No Types Assigned
http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html Patch, Third Party Advisory
Changed
Reference Type
http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2016-3090545.html No Types Assigned
http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2016-3090545.html Third Party Advisory
Changed
Reference Type
http://www.oracle.com/technetwork/topics/security/ovmbulletinoct2016-3090547.html No Types Assigned
http://www.oracle.com/technetwork/topics/security/ovmbulletinoct2016-3090547.html Third Party Advisory
Changed
Reference Type
http://www.securityfocus.com/bid/92630 No Types Assigned
http://www.securityfocus.com/bid/92630 Third Party Advisory, VDB Entry
Changed
Reference Type
http://www.securityfocus.com/bid/95568 No Types Assigned
http://www.securityfocus.com/bid/95568 Third Party Advisory, VDB Entry
Changed
Reference Type
http://www.securitytracker.com/id/1036696 No Types Assigned
http://www.securitytracker.com/id/1036696 Third Party Advisory, VDB Entry
Changed
Reference Type
http://www.splunk.com/view/SP-CAAAPSV No Types Assigned
http://www.splunk.com/view/SP-CAAAPSV Third Party Advisory
Changed
Reference Type
http://www.splunk.com/view/SP-CAAAPUE No Types Assigned
http://www.splunk.com/view/SP-CAAAPUE Third Party Advisory
Changed
Reference Type
https://access.redhat.com/errata/RHSA-2017:1216 No Types Assigned
https://access.redhat.com/errata/RHSA-2017:1216 Third Party Advisory
Changed
Reference Type
https://access.redhat.com/errata/RHSA-2017:2708 No Types Assigned
https://access.redhat.com/errata/RHSA-2017:2708 Third Party Advisory
Changed
Reference Type
https://access.redhat.com/errata/RHSA-2017:2709 No Types Assigned
https://access.redhat.com/errata/RHSA-2017:2709 Third Party Advisory
Changed
Reference Type
https://access.redhat.com/errata/RHSA-2017:2710 No Types Assigned
https://access.redhat.com/errata/RHSA-2017:2710 Third Party Advisory
Changed
Reference Type
https://access.redhat.com/errata/RHSA-2017:3113 No Types Assigned
https://access.redhat.com/errata/RHSA-2017:3113 Third Party Advisory
Changed
Reference Type
https://access.redhat.com/errata/RHSA-2017:3114 No Types Assigned
https://access.redhat.com/errata/RHSA-2017:3114 Third Party Advisory
Changed
Reference Type
https://access.redhat.com/errata/RHSA-2017:3239 No Types Assigned
https://access.redhat.com/errata/RHSA-2017:3239 Third Party Advisory
Changed
Reference Type
https://access.redhat.com/errata/RHSA-2017:3240 No Types Assigned
https://access.redhat.com/errata/RHSA-2017:3240 Third Party Advisory
Changed
Reference Type
https://bto.bluecoat.com/security-advisory/sa133 No Types Assigned
https://bto.bluecoat.com/security-advisory/sa133 Third Party Advisory
Changed
Reference Type
https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbgn03765en_us No Types Assigned
https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbgn03765en_us Third Party Advisory
Changed
Reference Type
https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03725en_us No Types Assigned
https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03725en_us Third Party Advisory
Changed
Reference Type
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05302448 No Types Assigned
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05302448 Third Party Advisory
Changed
Reference Type
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05309984 No Types Assigned
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05309984 Third Party Advisory
Changed
Reference Type
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05323116 No Types Assigned
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05323116 Third Party Advisory
Changed
Reference Type
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05349499 No Types Assigned
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05349499 Third Party Advisory
Changed
Reference Type
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05356388 No Types Assigned
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05356388 Third Party Advisory
Changed
Reference Type
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05369403 No Types Assigned
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05369403 Third Party Advisory
Changed
Reference Type
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05369415 No Types Assigned
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05369415 Third Party Advisory
Changed
Reference Type
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05385680 No Types Assigned
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05385680 Third Party Advisory
Changed
Reference Type
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722 No Types Assigned
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722 Third Party Advisory
Changed
Reference Type
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390849 No Types Assigned
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390849 Third Party Advisory
Changed
Reference Type
https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA40312 No Types Assigned
https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA40312 Third Party Advisory
Changed
Reference Type
https://kc.mcafee.com/corporate/index?page=content&id=SB10171 No Types Assigned
https://kc.mcafee.com/corporate/index?page=content&id=SB10171 Third Party Advisory
Changed
Reference Type
https://nodejs.org/en/blog/vulnerability/september-2016-security-releases/ No Types Assigned
https://nodejs.org/en/blog/vulnerability/september-2016-security-releases/ Third Party Advisory
Changed
Reference Type
https://security.gentoo.org/glsa/201612-16 No Types Assigned
https://security.gentoo.org/glsa/201612-16 Third Party Advisory
Changed
Reference Type
https://security.gentoo.org/glsa/201701-65 No Types Assigned
https://security.gentoo.org/glsa/201701-65 Third Party Advisory
Changed
Reference Type
https://security.gentoo.org/glsa/201707-01 No Types Assigned
https://security.gentoo.org/glsa/201707-01 Third Party Advisory
Changed
Reference Type
https://security.netapp.com/advisory/ntap-20160915-0001/ No Types Assigned
https://security.netapp.com/advisory/ntap-20160915-0001/ Third Party Advisory
Changed
Reference Type
https://security.netapp.com/advisory/ntap-20170119-0001/ No Types Assigned
https://security.netapp.com/advisory/ntap-20170119-0001/ Third Party Advisory
Changed
Reference Type
https://www.tenable.com/security/tns-2016-16 No Types Assigned
https://www.tenable.com/security/tns-2016-16 Third Party Advisory
Changed
Reference Type
https://www.tenable.com/security/tns-2016-20 No Types Assigned
https://www.tenable.com/security/tns-2016-20 Third Party Advisory
Changed
Reference Type
https://www.tenable.com/security/tns-2016-21 No Types Assigned
https://www.tenable.com/security/tns-2016-21 Third Party Advisory
Changed
Reference Type
https://www.tenable.com/security/tns-2017-09 No Types Assigned
https://www.tenable.com/security/tns-2017-09 Third Party Advisory
CVE Modified by Red Hat, Inc. 1/18/2018 1:18:05 PM
Action
Type
Old Value
New Value
Added
Reference
http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html [No Types Assigned]
CVE Modified by Red Hat, Inc. 1/04/2018 9:30:38 PM
Action
Type
Old Value
New Value
Added
Reference
http://rhn.redhat.com/errata/RHSA-2017-0336.html [No Types Assigned]
Added
Reference
http://rhn.redhat.com/errata/RHSA-2017-0337.html [No Types Assigned]
Added
Reference
http://rhn.redhat.com/errata/RHSA-2017-0338.html [No Types Assigned]
Added
Reference
http://rhn.redhat.com/errata/RHSA-2017-0462.html [No Types Assigned]
Added
Reference
https://access.redhat.com/errata/RHSA-2017:1216 [No Types Assigned]
CVE Modified by Red Hat, Inc. 12/08/2017 9:29:05 PM
Action
Type
Old Value
New Value
Added
Reference
https://access.redhat.com/errata/RHSA-2017:2708 [No Types Assigned]
Added
Reference
https://access.redhat.com/errata/RHSA-2017:2709 [No Types Assigned]
Added
Reference
https://access.redhat.com/errata/RHSA-2017:2710 [No Types Assigned]
CVE Modified by Red Hat, Inc. 12/01/2017 9:29:00 PM
Action
Type
Old Value
New Value
Added
Reference
https://access.redhat.com/errata/RHSA-2017:3113 [No Types Assigned]
Added
Reference
https://access.redhat.com/errata/RHSA-2017:3114 [No Types Assigned]
Added
Reference
https://access.redhat.com/errata/RHSA-2017:3239 [No Types Assigned]
Added
Reference
https://access.redhat.com/errata/RHSA-2017:3240 [No Types Assigned]
CVE Modified by Red Hat, Inc. 11/09/2017 9:29:08 PM
Action
Type
Old Value
New Value
Added
Reference
https://security.netapp.com/advisory/ntap-20160915-0001/ [No Types Assigned]
Added
Reference
https://security.netapp.com/advisory/ntap-20170119-0001/ [No Types Assigned]
CVE Modified by Red Hat, Inc. 11/02/2017 9:29:02 PM
Action
Type
Old Value
New Value
Added
Reference
https://www.tenable.com/security/tns-2016-20 [No Types Assigned]
Added
Reference
https://www.tenable.com/security/tns-2016-21 [No Types Assigned]
Added
Reference
https://www.tenable.com/security/tns-2017-09 [No Types Assigned]
CVE Modified by Red Hat, Inc. 10/19/2017 9:29:09 PM
Action
Type
Old Value
New Value
Added
Reference
http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html [No Types Assigned]
CVE Modified by Red Hat, Inc. 8/15/2017 9:29:06 PM
Action
Type
Old Value
New Value
Added
Reference
http://www.securitytracker.com/id/1036696 [No Types Assigned]
CVE Modified by Red Hat, Inc. 8/11/2017 9:29:00 PM
Action
Type
Old Value
New Value
Added
Reference
https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbgn03765en_us [No Types Assigned]
CVE Modified by Red Hat, Inc. 8/08/2017 9:29:05 PM
Action
Type
Old Value
New Value
Added
Reference
http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html [No Types Assigned]
CVE Modified by Red Hat, Inc. 7/06/2017 9:29:00 PM
Action
Type
Old Value
New Value
Added
Reference
https://security.gentoo.org/glsa/201707-01 [No Types Assigned]
CVE Modified by Red Hat, Inc. 5/09/2017 9:29:01 PM
Action
Type
Old Value
New Value
Added
Reference
https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03725en_us [No Types Assigned]
CVE Modified by Red Hat, Inc. 5/08/2017 9:29:01 PM
Action
Type
Old Value
New Value
Added
Reference
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390849 [No Types Assigned]
CVE Modified by Red Hat, Inc. 2/16/2017 9:59:11 PM
Action
Type
Old Value
New Value
Added
Reference
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722 [No Types Assigned]
CVE Modified by Red Hat, Inc. 2/10/2017 9:59:00 PM
Action
Type
Old Value
New Value
Added
Reference
https://security.gentoo.org/glsa/201701-65 [No Types Assigned]
Modified Analysis by NIST 2/08/2017 9:18:58 AM
Action
Type
Old Value
New Value
Changed
CPE Configuration
OR
*cpe:2.3:a:openssl:openssl:1.0.1:*:*:*:*:*:*:*
*cpe:2.3:a:openssl:openssl:1.0.2:*:*:*:*:*:*:*
*cpe:2.3:a:openssl:openssl:1.1.0:*:*:*:*:*:*:*
OR
*cpe:2.3:a:openssl:openssl:1.0.1a:*:*:*:*:*:*:*
*cpe:2.3:a:openssl:openssl:1.0.1b:*:*:*:*:*:*:*
*cpe:2.3:a:openssl:openssl:1.0.1c:*:*:*:*:*:*:*
*cpe:2.3:a:openssl:openssl:1.0.1d:*:*:*:*:*:*:*
*cpe:2.3:a:openssl:openssl:1.0.1e:*:*:*:*:*:*:*
*cpe:2.3:a:openssl:openssl:1.0.1f:*:*:*:*:*:*:*
*cpe:2.3:a:openssl:openssl:1.0.1g:*:*:*:*:*:*:*
*cpe:2.3:a:openssl:openssl:1.0.1h:*:*:*:*:*:*:*
*cpe:2.3:a:openssl:openssl:1.0.1i:*:*:*:*:*:*:*
*cpe:2.3:a:openssl:openssl:1.0.1j:*:*:*:*:*:*:*
*cpe:2.3:a:openssl:openssl:1.0.1k:*:*:*:*:*:*:*
*cpe:2.3:a:openssl:openssl:1.0.1l:*:*:*:*:*:*:*
*cpe:2.3:a:openssl:openssl:1.0.1m:*:*:*:*:*:*:*
*cpe:2.3:a:openssl:openssl:1.0.1n:*:*:*:*:*:*:*
*cpe:2.3:a:openssl:openssl:1.0.1o:*:*:*:*:*:*:*
*cpe:2.3:a:openssl:openssl:1.0.1p:*:*:*:*:*:*:*
*cpe:2.3:a:openssl:openssl:1.0.1q:*:*:*:*:*:*:*
*cpe:2.3:a:openssl:openssl:1.0.1r:*:*:*:*:*:*:*
*cpe:2.3:a:openssl:openssl:1.0.1t:*:*:*:*:*:*:*
*cpe:2.3:a:openssl:openssl:1.0.2a:*:*:*:*:*:*:*
*cpe:2.3:a:openssl:openssl:1.0.2b:*:*:*:*:*:*:*
*cpe:2.3:a:openssl:openssl:1.0.2c:*:*:*:*:*:*:*
*cpe:2.3:a:openssl:openssl:1.0.2d:*:*:*:*:*:*:*
*cpe:2.3:a:openssl:openssl:1.0.2e:*:*:*:*:*:*:*
*cpe:2.3:a:openssl:openssl:1.0.2f:*:*:*:*:*:*:*
*cpe:2.3:a:openssl:openssl:1.0.2h:*:*:*:*:*:*:*
CVE Modified by Red Hat, Inc. 2/07/2017 9:59:09 PM
Action
Type
Old Value
New Value
Added
Reference
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05385680 [No Types Assigned]
CVE Modified by Red Hat, Inc. 2/01/2017 9:59:02 PM
Action
Type
Old Value
New Value
Added
Reference
http://www-01.ibm.com/support/docview.wss?uid=nas8N1021697 [No Types Assigned]
Added
Reference
http://www-01.ibm.com/support/docview.wss?uid=swg21991482 [No Types Assigned]
Added
Reference
http://www-01.ibm.com/support/docview.wss?uid=swg21995039 [No Types Assigned]
Added
Reference
https://www.tenable.com/security/tns-2016-16 [No Types Assigned]
CVE Modified by Red Hat, Inc. 1/19/2017 9:59:04 PM
Action
Type
Old Value
New Value
Added
Reference
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05369415 [No Types Assigned]
CVE Modified by Red Hat, Inc. 1/18/2017 9:59:03 PM
Action
Type
Old Value
New Value
Added
Reference
http://www.securityfocus.com/bid/95568 [No Types Assigned]
CVE Modified by Red Hat, Inc. 1/17/2017 9:59:05 PM
Action
Type
Old Value
New Value
Added
Reference
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05369403 [No Types Assigned]
CVE Modified by Red Hat, Inc. 12/27/2016 9:59:30 PM
Action
Type
Old Value
New Value
Added
Reference
http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10759 [No Types Assigned]
Added
Reference
https://bto.bluecoat.com/security-advisory/sa133 [No Types Assigned]
Added
Reference
https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA40312 [No Types Assigned]
Added
Reference
https://kc.mcafee.com/corporate/index?page=content&id=SB10171 [No Types Assigned]
Added
Reference
https://security.gentoo.org/glsa/201612-16 [No Types Assigned]
CVE Modified by Red Hat, Inc. 12/23/2016 9:59:40 PM
Action
Type
Old Value
New Value
Added
Reference
http://www.splunk.com/view/SP-CAAAPSV [No Types Assigned]
Added
Reference
http://www.splunk.com/view/SP-CAAAPUE [No Types Assigned]
CVE Modified by Red Hat, Inc. 12/19/2016 9:59:20 PM
Action
Type
Old Value
New Value
Added
Reference
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05356388 [No Types Assigned]
Removed
Reference
http://www.securityfocus.com/bid/92630/references [Third Party Advisory, VDB Entry]
Removed
Reference
https://bugs.python.org/issue27850 [Issue Tracking, Third Party Advisory]
Removed
Reference
https://bugzilla.suse.com/show_bug.cgi?id=995359 [Issue Tracking, Third Party Advisory]
Removed
Reference
https://community.qualys.com/thread/16555 [Press/Media Coverage, Third Party Advisory]
Removed
Reference
https://quickview.cloudapps.cisco.com/quickview/bug/CSCvb05575 [Third Party Advisory]
Removed
Reference
https://security-tracker.debian.org/tracker/CVE-2016-2183 [Third Party Advisory]
Removed
Reference
https://twitter.com/symantec/status/768786631159603200 [Press/Media Coverage]
Removed
Reference
https://www.suse.com/security/cve/CVE-2016-2183.html [Third Party Advisory]
CVE Modified by Red Hat, Inc. 12/08/2016 9:59:09 PM
Action
Type
Old Value
New Value
Added
Reference
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05349499 [No Types Assigned]
CVE Modified by Red Hat, Inc. 11/28/2016 3:03:40 PM
Action
Type
Old Value
New Value
Added
Reference
http://www.securityfocus.com/bid/92630 [No Types Assigned]
CVE Modified by Red Hat, Inc. 11/03/2016 9:59:07 PM
Action
Type
Old Value
New Value
Added
Reference
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05323116
CVE Modified by Red Hat, Inc. 10/26/2016 9:59:50 PM
Action
Type
Old Value
New Value
Added
Reference
http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2016-3090545.html
Added
Reference
http://www.oracle.com/technetwork/topics/security/ovmbulletinoct2016-3090547.html
CVE Modified by Red Hat, Inc. 10/25/2016 10:02:22 PM
Action
Type
Old Value
New Value
Added
Reference
http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html
CVE Modified by Red Hat, Inc. 10/24/2016 10:01:26 PM
Action
Type
Old Value
New Value
Added
Reference
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05309984
CVE Modified by Red Hat, Inc. 10/17/2016 11:47:41 PM
Action
Type
Old Value
New Value
Added
Reference
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05302448
CVE Modified by Red Hat, Inc. 10/11/2016 10:02:34 PM
Action
Type
Old Value
New Value
Added
Reference
http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00013.html
Added
Reference
https://nodejs.org/en/blog/vulnerability/september-2016-security-releases/
Modified Analysis by NIST 9/14/2016 11:29:35 AM
Action
Type
Old Value
New Value
Changed
CPE Configuration
Configuration 1
OR
*cpe:2.3:a:cisco:content_security_management_appliance:9.7.0-006:*:*:*:*:*:*:*
*cpe:2.3:a:cisco:content_security_management_appliance:9.6.6-068:*:*:*:*:*:*:*
Configuration 2
OR
*cpe:2.3:a:redhat:jboss_web_server:3.0:*:*:*:*:*:*:*
*cpe:2.3:a:redhat:jboss_enterprise_web_server:2.0.0:*:*:*:*:*:*:*
*cpe:2.3:a:redhat:jboss_enterprise_application_platform:6.0.0:*:*:*:*:*:*:*
*cpe:2.3:a:redhat:jboss_enterprise_web_server:1.0.0:*:*:*:*:*:*:*
*cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*
*cpe:2.3:o:redhat:enterprise_linux:5.0:*:*:*:*:*:*:*
*cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*
Configuration 3
OR
*cpe:2.3:a:openssl:openssl:1.0.2:*:*:*:*:*:*:*
*cpe:2.3:a:openssl:openssl:1.1.0:*:*:*:*:*:*:*
*cpe:2.3:a:openssl:openssl:1.0.1:*:*:*:*:*:*:*
Configuration 4
OR
*cpe:2.3:a:python:python:3.5:*:*:*:*:*:*:*
*cpe:2.3:a:python:python:3.6:*:*:*:*:*:*:*
*cpe:2.3:a:python:python:3.4.0:*:*:*:*:*:*:*
*cpe:2.3:a:python:python:3.3:*:*:*:*:*:*:*
*cpe:2.3:a:python:python:2.7:*:*:*:*:*:*:*
Configuration 1
OR
*cpe:2.3:a:redhat:jboss_web_server:3.0:*:*:*:*:*:*:*
*cpe:2.3:a:redhat:jboss_enterprise_web_server:2.0.0:*:*:*:*:*:*:*
*cpe:2.3:a:redhat:jboss_enterprise_application_platform:6.0.0:*:*:*:*:*:*:*
*cpe:2.3:a:redhat:jboss_enterprise_web_server:1.0.0:*:*:*:*:*:*:*
*cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*
*cpe:2.3:o:redhat:enterprise_linux:5.0:*:*:*:*:*:*:*
*cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*
Configuration 2
OR
*cpe:2.3:a:python:python:3.5:*:*:*:*:*:*:*
*cpe:2.3:a:python:python:3.6:*:*:*:*:*:*:*
*cpe:2.3:a:python:python:3.4.0:*:*:*:*:*:*:*
*cpe:2.3:a:python:python:3.3:*:*:*:*:*:*:*
*cpe:2.3:a:python:python:2.7:*:*:*:*:*:*:*
Configuration 3
OR
*cpe:2.3:a:cisco:content_security_management_appliance:9.7.0-006:*:*:*:*:*:*:*
*cpe:2.3:a:cisco:content_security_management_appliance:9.6.6-068:*:*:*:*:*:*:*
Configuration 4
OR
*cpe:2.3:a:openssl:openssl:1.0.2:*:*:*:*:*:*:*
*cpe:2.3:a:openssl:openssl:1.1.0:*:*:*:*:*:*:*
*cpe:2.3:a:openssl:openssl:1.0.1:*:*:*:*:*:*:*
Modified Analysis by NIST 9/14/2016 10:45:34 AM
Action
Type
Old Value
New Value
Changed
CPE Configuration
Configuration 1
OR
*cpe:2.3:a:openssl:openssl:1.0.2:*:*:*:*:*:*:*
*cpe:2.3:a:openssl:openssl:1.1.0:*:*:*:*:*:*:*
*cpe:2.3:a:openssl:openssl:1.0.1:*:*:*:*:*:*:*
Configuration 2
OR
*cpe:2.3:a:cisco:content_security_management_appliance:9.7.0-006:*:*:*:*:*:*:*
*cpe:2.3:a:cisco:content_security_management_appliance:9.6.6-068:*:*:*:*:*:*:*
Configuration 3
OR
*cpe:2.3:a:python:python:3.5:*:*:*:*:*:*:*
*cpe:2.3:a:python:python:3.6:*:*:*:*:*:*:*
*cpe:2.3:a:python:python:3.4.0:*:*:*:*:*:*:*
*cpe:2.3:a:python:python:3.3:*:*:*:*:*:*:*
*cpe:2.3:a:python:python:2.7:*:*:*:*:*:*:*
Configuration 4
OR
*cpe:2.3:a:redhat:jboss_web_server:3.0:*:*:*:*:*:*:*
*cpe:2.3:a:redhat:jboss_enterprise_web_server:2.0.0:*:*:*:*:*:*:*
*cpe:2.3:a:redhat:jboss_enterprise_application_platform:6.0.0:*:*:*:*:*:*:*
*cpe:2.3:a:redhat:jboss_enterprise_web_server:1.0.0:*:*:*:*:*:*:*
*cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*
*cpe:2.3:o:redhat:enterprise_linux:5.0:*:*:*:*:*:*:*
*cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*
Configuration 1
OR
*cpe:2.3:a:cisco:content_security_management_appliance:9.7.0-006:*:*:*:*:*:*:*
*cpe:2.3:a:cisco:content_security_management_appliance:9.6.6-068:*:*:*:*:*:*:*
Configuration 2
OR
*cpe:2.3:a:redhat:jboss_web_server:3.0:*:*:*:*:*:*:*
*cpe:2.3:a:redhat:jboss_enterprise_web_server:2.0.0:*:*:*:*:*:*:*
*cpe:2.3:a:redhat:jboss_enterprise_application_platform:6.0.0:*:*:*:*:*:*:*
*cpe:2.3:a:redhat:jboss_enterprise_web_server:1.0.0:*:*:*:*:*:*:*
*cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*
*cpe:2.3:o:redhat:enterprise_linux:5.0:*:*:*:*:*:*:*
*cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*
Configuration 3
OR
*cpe:2.3:a:openssl:openssl:1.0.2:*:*:*:*:*:*:*
*cpe:2.3:a:openssl:openssl:1.1.0:*:*:*:*:*:*:*
*cpe:2.3:a:openssl:openssl:1.0.1:*:*:*:*:*:*:*
Configuration 4
OR
*cpe:2.3:a:python:python:3.5:*:*:*:*:*:*:*
*cpe:2.3:a:python:python:3.6:*:*:*:*:*:*:*
*cpe:2.3:a:python:python:3.4.0:*:*:*:*:*:*:*
*cpe:2.3:a:python:python:3.3:*:*:*:*:*:*:*
*cpe:2.3:a:python:python:2.7:*:*:*:*:*:*:*
Modified Analysis by NIST 9/01/2016 2:32:29 PM
Action
Type
Old Value
New Value
Added
CVSS V3
AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
Added
CVSS V2
(AV:N/AC:L/Au:N/C:P/I:N/A:N)
Added
CWE
CWE-200
Added
CPE Configuration
Configuration 1
OR
*cpe:2.3:a:openssl:openssl:1.0.2:*:*:*:*:*:*:*
*cpe:2.3:a:openssl:openssl:1.1.0:*:*:*:*:*:*:*
*cpe:2.3:a:openssl:openssl:1.0.1:*:*:*:*:*:*:*
Configuration 2
OR
*cpe:2.3:a:cisco:content_security_management_appliance:9.7.0-006:*:*:*:*:*:*:*
*cpe:2.3:a:cisco:content_security_management_appliance:9.6.6-068:*:*:*:*:*:*:*
Configuration 3
OR
*cpe:2.3:a:python:python:3.5:*:*:*:*:*:*:*
*cpe:2.3:a:python:python:3.6:*:*:*:*:*:*:*
*cpe:2.3:a:python:python:3.4.0:*:*:*:*:*:*:*
*cpe:2.3:a:python:python:3.3:*:*:*:*:*:*:*
*cpe:2.3:a:python:python:2.7:*:*:*:*:*:*:*
Configuration 4
OR
*cpe:2.3:a:redhat:jboss_web_server:3.0:*:*:*:*:*:*:*
*cpe:2.3:a:redhat:jboss_enterprise_web_server:2.0.0:*:*:*:*:*:*:*
*cpe:2.3:a:redhat:jboss_enterprise_application_platform:6.0.0:*:*:*:*:*:*:*
*cpe:2.3:a:redhat:jboss_enterprise_web_server:1.0.0:*:*:*:*:*:*:*
*cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*
*cpe:2.3:o:redhat:enterprise_linux:5.0:*:*:*:*:*:*:*
*cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*
Added
Reference
http://www.securityfocus.com/bid/92630/references
Added
Reference
https://bugs.python.org/issue27850
Added
Reference
https://bugzilla.suse.com/show_bug.cgi?id=995359
Added
Reference
https://community.qualys.com/thread/16555
Added
Reference
https://quickview.cloudapps.cisco.com/quickview/bug/CSCvb05575
Added
Reference
https://security-tracker.debian.org/tracker/CVE-2016-2183
Added
Reference
https://twitter.com/symantec/status/768786631159603200
Added
Reference
https://www.suse.com/security/cve/CVE-2016-2183.html
Changed
Reference Type
https://access.redhat.com/articles/2548661 No Types Assigned
https://access.redhat.com/articles/2548661 Mitigation, Third Party Advisory
Changed
Reference Type
https://access.redhat.com/security/cve/cve-2016-2183 No Types Assigned
https://access.redhat.com/security/cve/cve-2016-2183 Third Party Advisory
Changed
Reference Type
https://blog.cryptographyengineering.com/2016/08/24/attack-of-week-64-bit-ciphers-in-tls/ No Types Assigned
https://blog.cryptographyengineering.com/2016/08/24/attack-of-week-64-bit-ciphers-in-tls/ Third Party Advisory, Technical Description, Press/Media Coverage
Changed
Reference Type
https://bugzilla.redhat.com/show_bug.cgi?id=1369383 No Types Assigned
https://bugzilla.redhat.com/show_bug.cgi?id=1369383 Third Party Advisory, Issue Tracking
Changed
Reference Type
https://github.com/ssllabs/ssllabs-scan/issues/387#issuecomment-242514633 No Types Assigned
https://github.com/ssllabs/ssllabs-scan/issues/387#issuecomment-242514633 Third Party Advisory
Changed
Reference Type
https://nakedsecurity.sophos.com/2016/08/25/anatomy-of-a-cryptographic-collision-the-sweet32-attack/ No Types Assigned
https://nakedsecurity.sophos.com/2016/08/25/anatomy-of-a-cryptographic-collision-the-sweet32-attack/ Third Party Advisory, Technical Description, Press/Media Coverage
Changed
Reference Type
https://sweet32.info/ No Types Assigned
https://sweet32.info/ Third Party Advisory, Technical Description
Changed
Reference Type
https://www.ietf.org/mail-archive/web/tls/current/msg04560.html No Types Assigned
https://www.ietf.org/mail-archive/web/tls/current/msg04560.html Third Party Advisory, Mailing List
Changed
Reference Type
https://www.nccgroup.trust/us/about-us/newsroom-and-events/blog/2016/august/new-practical-attacks-on-64-bit-block-ciphers-3des-blowfish/ No Types Assigned
https://www.nccgroup.trust/us/about-us/newsroom-and-events/blog/2016/august/new-practical-attacks-on-64-bit-block-ciphers-3des-blowfish/ Third Party Advisory, Technical Description, Press/Media Coverage
Changed
Reference Type
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ No Types Assigned
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ Mitigation, Third Party Advisory, Press/Media Coverage
Changed
Reference Type
https://www.sigsac.org/ccs/CCS2016/accepted-papers/ No Types Assigned
https://www.sigsac.org/ccs/CCS2016/accepted-papers/ Third Party Advisory
Changed
Reference Type
https://www.teskalabs.com/blog/teskalabs-bulletin-160826-seacat-sweet32-issue No Types Assigned
https://www.teskalabs.com/blog/teskalabs-bulletin-160826-seacat-sweet32-issue Third Party Advisory
Initial CVE Analysis 9/01/2016 2:27:28 PM
Action
Type
Old Value
New Value
Quick Info
CVE Dictionary Entry: CVE-2016-2183 NVD
Published Date: 08/31/2016 NVD
Last Modified: 04/12/2025
Source: Red Hat, Inc.