The DHcheckpubkey function in crypto/dh/dhcheck.c in OpenSSL 1.0.2 before 1.0.2f does not ensure that prime numbers are appropriate for Diffie-Hellman (DH) key exchange, which makes it easier for remote attackers to discover a private DH exponent by making multiple handshakes with a peer that chose an inappropriate number, as demonstrated by a number in an X9.42 file.
{
"source": "CPE_FIELD",
"cpe": [
"cpe:2.3:a:openssl:openssl:1.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:openssl:openssl:1.0.2:beta1:*:*:*:*:*:*",
"cpe:2.3:a:openssl:openssl:1.0.2:beta2:*:*:*:*:*:*",
"cpe:2.3:a:openssl:openssl:1.0.2:beta3:*:*:*:*:*:*",
"cpe:2.3:a:openssl:openssl:1.0.2a:*:*:*:*:*:*:*",
"cpe:2.3:a:openssl:openssl:1.0.2b:*:*:*:*:*:*:*",
"cpe:2.3:a:openssl:openssl:1.0.2c:*:*:*:*:*:*:*",
"cpe:2.3:a:openssl:openssl:1.0.2d:*:*:*:*:*:*:*",
"cpe:2.3:a:openssl:openssl:1.0.2e:*:*:*:*:*:*:*"
],
"extracted_events": [
{
"introduced": "1.0.2"
},
{
"fixed": "1.0.2f"
}
]
}"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2016-0701.json"
[
{
"signature_type": "Line",
"signature_version": "v1",
"deprecated": false,
"digest": {
"line_hashes": [
"148029424052934803331211646646150309470",
"297224766741570165540841011430904355399",
"279404135939441039589908012087022866338",
"291925673690878877945865960478870857538",
"19054597365316541678142098092550582161",
"56743692971644723600473384804813888343",
"339375801635017027508014490563703739240",
"31590020450961126615374648436347486200"
],
"threshold": 0.9
},
"target": {
"file": "crypto/opensslv.h"
},
"source": "https://github.com/openssl/openssl/commit/95605f3ae1ec8857e8cb612ce35805a3b0207d21",
"id": "CVE-2016-0701-0aaf37f6"
}
]
"2026-04-10T23:47:35Z"