CVE-2016-2107

MEDIUM

Redhat Enterprise Linux Desktop < 1.0.1s - Information Disclosure

Title source: rule

Description

The AES-NI implementation in OpenSSL before 1.0.1t and 1.0.2 before 1.0.2h does not consider memory allocation during a certain padding check, which allows remote attackers to obtain sensitive cleartext information via a padding-oracle attack against an AES CBC session. NOTE: this vulnerability exists because of an incorrect fix for CVE-2013-0169.

Exploits (3)

nomisec WORKING POC 194 stars
by FiloSottile · poc
https://github.com/FiloSottile/CVE-2016-2107
nomisec WORKING POC 2 stars
by tmiklas · poc
https://github.com/tmiklas/docker-cve-2016-2107
exploitdb WORKING POC VERIFIED
by Juraj Somorovsky · textdosmultiple
https://www.exploit-db.com/exploits/39768

References (58)

... and 38 more

Scores

CVSS v3 5.9
EPSS 0.8272
EPSS Percentile 99.2%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N

Classification

CWE
CWE-310 CWE-200
Status draft

Affected Products (50)

redhat/enterprise_linux_desktop
redhat/enterprise_linux_hpc_node
redhat/enterprise_linux_hpc_node_eus
redhat/enterprise_linux_server
redhat/enterprise_linux_server_aus
redhat/enterprise_linux_server_eus
redhat/enterprise_linux_workstation
opensuse/leap
opensuse/opensuse
openssl/openssl < 1.0.1s
openssl/openssl
openssl/openssl
openssl/openssl
openssl/openssl
openssl/openssl
... and 35 more

Timeline

Published May 05, 2016
Tracked Since Feb 18, 2026