{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"state":"PUBLISHED","cveId":"CVE-2016-2180","assignerOrgId":"53f830b8-0a3f-465b-8143-3b8a9948e749","assignerShortName":"redhat","dateUpdated":"2024-08-05T23:17:50.695Z","dateReserved":"2016-01-29T00:00:00.000Z","datePublished":"2016-08-01T00:00:00.000Z"},"containers":{"cna":{"providerMetadata":{"orgId":"53f830b8-0a3f-465b-8143-3b8a9948e749","shortName":"redhat","dateUpdated":"2022-12-13T00:00:00.000Z"},"descriptions":[{"lang":"en","value":"The TS_OBJ_print_bio function in crypto/ts/ts_lib.c in the X.509 Public Key Infrastructure Time-Stamp Protocol (TSP) implementation in OpenSSL through 1.0.2h allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via a crafted time-stamp file that is mishandled by the \"openssl ts\" command."}],"affected":[{"vendor":"n/a","product":"n/a","versions":[{"version":"n/a","status":"affected"}]}],"references":[{"url":"https://www.tenable.com/security/tns-2016-20"},{"url":"https://github.com/openssl/openssl/commit/0ed26acce328ec16a3aa635f1ca37365e8c7403a"},{"url":"http://www.splunk.com/view/SP-CAAAPUE"},{"name":"1036486","tags":["vdb-entry"],"url":"http://www.securitytracker.com/id/1036486"},{"url":"http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html"},{"name":"RHSA-2016:1940","tags":["vendor-advisory"],"url":"http://rhn.redhat.com/errata/RHSA-2016-1940.html"},{"url":"http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2016-3090545.html"},{"name":"GLSA-201612-16","tags":["vendor-advisory"],"url":"https://security.gentoo.org/glsa/201612-16"},{"url":"https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA40312"},{"url":"https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03856en_us"},{"url":"http://www.splunk.com/view/SP-CAAAPSV"},{"url":"http://www-01.ibm.com/support/docview.wss?uid=swg21995039"},{"url":"http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html"},{"url":"https://www.tenable.com/security/tns-2016-16"},{"url":"https://www.tenable.com/security/tns-2016-21"},{"url":"http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html"},{"url":"http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html"},{"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1359615"},{"url":"http://www.oracle.com/technetwork/topics/security/ovmbulletinoct2016-3090547.html"},{"url":"https://bto.bluecoat.com/security-advisory/sa132"},{"url":"http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html"},{"name":"FreeBSD-SA-16:26","tags":["vendor-advisory"],"url":"https://security.FreeBSD.org/advisories/FreeBSD-SA-16:26.openssl.asc"},{"url":"http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10759"},{"name":"92117","tags":["vdb-entry"],"url":"http://www.securityfocus.com/bid/92117"},{"url":"https://cert-portal.siemens.com/productcert/pdf/ssa-412672.pdf"}],"problemTypes":[{"descriptions":[{"type":"text","lang":"en","description":"n/a"}]}],"datePublic":"2016-07-21T00:00:00.000Z"},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-05T23:17:50.695Z"},"title":"CVE Program Container","references":[{"url":"https://www.tenable.com/security/tns-2016-20","tags":["x_transferred"]},{"url":"https://github.com/openssl/openssl/commit/0ed26acce328ec16a3aa635f1ca37365e8c7403a","tags":["x_transferred"]},{"url":"http://www.splunk.com/view/SP-CAAAPUE","tags":["x_transferred"]},{"name":"1036486","tags":["vdb-entry","x_transferred"],"url":"http://www.securitytracker.com/id/1036486"},{"url":"http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html","tags":["x_transferred"]},{"name":"RHSA-2016:1940","tags":["vendor-advisory","x_transferred"],"url":"http://rhn.redhat.com/errata/RHSA-2016-1940.html"},{"url":"http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2016-3090545.html","tags":["x_transferred"]},{"name":"GLSA-201612-16","tags":["vendor-advisory","x_transferred"],"url":"https://security.gentoo.org/glsa/201612-16"},{"url":"https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA40312","tags":["x_transferred"]},{"url":"https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03856en_us","tags":["x_transferred"]},{"url":"http://www.splunk.com/view/SP-CAAAPSV","tags":["x_transferred"]},{"url":"http://www-01.ibm.com/support/docview.wss?uid=swg21995039","tags":["x_transferred"]},{"url":"http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html","tags":["x_transferred"]},{"url":"https://www.tenable.com/security/tns-2016-16","tags":["x_transferred"]},{"url":"https://www.tenable.com/security/tns-2016-21","tags":["x_transferred"]},{"url":"http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html","tags":["x_transferred"]},{"url":"http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html","tags":["x_transferred"]},{"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1359615","tags":["x_transferred"]},{"url":"http://www.oracle.com/technetwork/topics/security/ovmbulletinoct2016-3090547.html","tags":["x_transferred"]},{"url":"https://bto.bluecoat.com/security-advisory/sa132","tags":["x_transferred"]},{"url":"http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html","tags":["x_transferred"]},{"name":"FreeBSD-SA-16:26","tags":["vendor-advisory","x_transferred"],"url":"https://security.FreeBSD.org/advisories/FreeBSD-SA-16:26.openssl.asc"},{"url":"http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10759","tags":["x_transferred"]},{"name":"92117","tags":["vdb-entry","x_transferred"],"url":"http://www.securityfocus.com/bid/92117"},{"url":"https://cert-portal.siemens.com/productcert/pdf/ssa-412672.pdf","tags":["x_transferred"]}]}]}}