{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"state":"PUBLISHED","cveId":"CVE-2016-6307","assignerOrgId":"53f830b8-0a3f-465b-8143-3b8a9948e749","assignerShortName":"redhat","dateUpdated":"2024-08-06T01:29:18.334Z","dateReserved":"2016-07-26T00:00:00.000Z","datePublished":"2016-09-26T00:00:00.000Z"},"containers":{"cna":{"providerMetadata":{"orgId":"53f830b8-0a3f-465b-8143-3b8a9948e749","shortName":"redhat","dateUpdated":"2022-12-13T00:00:00.000Z"},"descriptions":[{"lang":"en","value":"The state-machine implementation in OpenSSL 1.1.0 before 1.1.0a allocates memory before checking for an excessive length, which might allow remote attackers to cause a denial of service (memory consumption) via crafted TLS messages, related to statem/statem.c and statem/statem_lib.c."}],"affected":[{"vendor":"n/a","product":"n/a","versions":[{"version":"n/a","status":"affected"}]}],"references":[{"url":"https://www.openssl.org/news/secadv/20160922.txt"},{"url":"https://www.tenable.com/security/tns-2016-20"},{"url":"http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html"},{"url":"http://www-01.ibm.com/support/docview.wss?uid=swg21995039"},{"name":"1036885","tags":["vdb-entry"],"url":"http://www.securitytracker.com/id/1036885"},{"url":"http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html"},{"url":"https://www.tenable.com/security/tns-2016-16"},{"url":"https://www.tenable.com/security/tns-2016-21"},{"url":"http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html"},{"url":"http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html"},{"url":"https://bto.bluecoat.com/security-advisory/sa132"},{"url":"http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html"},{"name":"93152","tags":["vdb-entry"],"url":"http://www.securityfocus.com/bid/93152"},{"url":"https://git.openssl.org/?p=openssl.git%3Ba=commit%3Bh=4b390b6c3f8df925dc92a3dd6b022baa9a2f4650"},{"url":"http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10759"},{"url":"https://cert-portal.siemens.com/productcert/pdf/ssa-412672.pdf"}],"problemTypes":[{"descriptions":[{"type":"text","lang":"en","description":"n/a"}]}],"datePublic":"2016-09-22T00:00:00.000Z"},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-06T01:29:18.334Z"},"title":"CVE Program Container","references":[{"url":"https://www.openssl.org/news/secadv/20160922.txt","tags":["x_transferred"]},{"url":"https://www.tenable.com/security/tns-2016-20","tags":["x_transferred"]},{"url":"http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html","tags":["x_transferred"]},{"url":"http://www-01.ibm.com/support/docview.wss?uid=swg21995039","tags":["x_transferred"]},{"name":"1036885","tags":["vdb-entry","x_transferred"],"url":"http://www.securitytracker.com/id/1036885"},{"url":"http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html","tags":["x_transferred"]},{"url":"https://www.tenable.com/security/tns-2016-16","tags":["x_transferred"]},{"url":"https://www.tenable.com/security/tns-2016-21","tags":["x_transferred"]},{"url":"http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html","tags":["x_transferred"]},{"url":"http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html","tags":["x_transferred"]},{"url":"https://bto.bluecoat.com/security-advisory/sa132","tags":["x_transferred"]},{"url":"http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html","tags":["x_transferred"]},{"name":"93152","tags":["vdb-entry","x_transferred"],"url":"http://www.securityfocus.com/bid/93152"},{"url":"https://git.openssl.org/?p=openssl.git%3Ba=commit%3Bh=4b390b6c3f8df925dc92a3dd6b022baa9a2f4650","tags":["x_transferred"]},{"url":"http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10759","tags":["x_transferred"]},{"url":"https://cert-portal.siemens.com/productcert/pdf/ssa-412672.pdf","tags":["x_transferred"]}]}]}}