7.5 High
CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:P/I:P/A:P
7.5 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
8.7 High
AI Score
Confidence
Low
0.202 Low
EPSS
Percentile
96.4%
Guido Vranken discovered that OpenSSL used undefined behaviour when
performing pointer arithmetic. A remote attacker could possibly use this
issue to cause OpenSSL to crash, resulting in a denial of service. This
issue only applied to Ubuntu 12.04 LTS and Ubuntu 14.04 LTS as other
releases were fixed in a previous security update. (CVE-2016-2177)
It was discovered that OpenSSL did not properly handle Montgomery
multiplication, resulting in incorrect results leading to transient
failures. This issue only applied to Ubuntu 16.04 LTS, and Ubuntu 16.10.
(CVE-2016-7055)
It was discovered that OpenSSL did not properly use constant-time
operations when performing ECDSA P-256 signing. A remote attacker could
possibly use this issue to perform a timing attack and recover private
ECDSA keys. This issue only applied to Ubuntu 12.04 LTS and Ubuntu 14.04
LTS. (CVE-2016-7056)
Shi Lei discovered that OpenSSL incorrectly handled certain warning alerts.
A remote attacker could possibly use this issue to cause OpenSSL to stop
responding, resulting in a denial of service. (CVE-2016-8610)
Robert Święcki discovered that OpenSSL incorrectly handled certain
truncated packets. A remote attacker could possibly use this issue to cause
OpenSSL to crash, resulting in a denial of service. (CVE-2017-3731)
It was discovered that OpenSSL incorrectly performed the x86_64 Montgomery
squaring procedure. While unlikely, a remote attacker could possibly use
this issue to recover private keys. This issue only applied to Ubuntu 16.04
LTS, and Ubuntu 16.10. (CVE-2017-3732)
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
Ubuntu | 16.10 | noarch | libssl1.0.0 | < 1.0.2g-1ubuntu9.1 | UNKNOWN |
Ubuntu | 16.10 | noarch | libcrypto1.0.0-udeb | < 1.0.2g-1ubuntu9.1 | UNKNOWN |
Ubuntu | 16.10 | noarch | libcrypto1.0.0-udeb-dbgsym | < 1.0.2g-1ubuntu9.1 | UNKNOWN |
Ubuntu | 16.10 | noarch | libssl-dev | < 1.0.2g-1ubuntu9.1 | UNKNOWN |
Ubuntu | 16.10 | noarch | libssl-dev-dbgsym | < 1.0.2g-1ubuntu9.1 | UNKNOWN |
Ubuntu | 16.10 | noarch | libssl-doc | < 1.0.2g-1ubuntu9.1 | UNKNOWN |
Ubuntu | 16.10 | noarch | libssl1.0.0-dbg | < 1.0.2g-1ubuntu9.1 | UNKNOWN |
Ubuntu | 16.10 | noarch | libssl1.0.0-dbgsym | < 1.0.2g-1ubuntu9.1 | UNKNOWN |
Ubuntu | 16.10 | noarch | libssl1.0.0-udeb | < 1.0.2g-1ubuntu9.1 | UNKNOWN |
Ubuntu | 16.10 | noarch | libssl1.0.0-udeb-dbgsym | < 1.0.2g-1ubuntu9.1 | UNKNOWN |
7.5 High
CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:P/I:P/A:P
7.5 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
8.7 High
AI Score
Confidence
Low
0.202 Low
EPSS
Percentile
96.4%