The AES-NI implementation in OpenSSL before 1.0.1t and 1.0.2 before 1.0.2h does not consider memory allocation during a certain padding check, which allows remote attackers to obtain sensitive cleartext information via a padding-oracle attack against an AES CBC session. NOTE: this vulnerability exists because of an incorrect fix for CVE-2013-0169.
{
"versions": [
{
"introduced": "0"
},
{
"last_affected": "7.0"
},
{
"introduced": "0"
},
{
"last_affected": "7.0"
},
{
"introduced": "0"
},
{
"last_affected": "7.2"
},
{
"introduced": "0"
},
{
"last_affected": "7.0"
},
{
"introduced": "0"
},
{
"last_affected": "7.2"
},
{
"introduced": "0"
},
{
"last_affected": "7.2"
},
{
"introduced": "0"
},
{
"last_affected": "7.0"
},
{
"introduced": "0"
},
{
"last_affected": "13.2"
},
{
"introduced": "0"
},
{
"last_affected": "4.1"
},
{
"introduced": "0"
},
{
"last_affected": "4.1.2"
},
{
"introduced": "0"
},
{
"last_affected": "4.2"
},
{
"introduced": "0"
},
{
"last_affected": "4.2.1"
},
{
"introduced": "0"
},
{
"last_affected": "4.2.2"
},
{
"introduced": "0"
},
{
"last_affected": "4.3"
},
{
"introduced": "0"
},
{
"last_affected": "4.3.1"
},
{
"introduced": "0"
},
{
"last_affected": "4.4"
},
{
"introduced": "0"
},
{
"last_affected": "4.4.1"
},
{
"introduced": "0"
},
{
"last_affected": "4.4.2"
},
{
"introduced": "0"
},
{
"last_affected": "4.4.3"
},
{
"introduced": "0"
},
{
"last_affected": "5.0"
},
{
"introduced": "0"
},
{
"last_affected": "5.1"
},
{
"introduced": "0"
},
{
"last_affected": "5.1.0"
},
{
"introduced": "0"
},
{
"last_affected": "2.0.0"
},
{
"introduced": "0"
},
{
"last_affected": "2.1.0"
},
{
"introduced": "0"
},
{
"last_affected": "6.0"
},
{
"introduced": "0"
},
{
"last_affected": "6.0"
},
{
"introduced": "0"
},
{
"last_affected": "6.0"
},
{
"introduced": "0"
},
{
"last_affected": "6.0"
},
{
"introduced": "0.10.0"
},
{
"fixed": "0.10.45"
},
{
"introduced": "0.12.0"
},
{
"fixed": "0.12.14"
},
{
"introduced": "4.0.0"
},
{
"last_affected": "4.1.2"
},
{
"introduced": "4.2.0"
},
{
"fixed": "4.4.4"
},
{
"introduced": "5.0.0"
},
{
"fixed": "5.11.1"
},
{
"introduced": "0"
},
{
"last_affected": "6.0.0"
},
{
"introduced": "0"
},
{
"last_affected": "8.0"
},
{
"introduced": "0"
},
{
"last_affected": "15.10"
}
]
}{
"versions": [
{
"introduced": "0"
},
{
"last_affected": "1.0.1s"
},
{
"introduced": "0"
},
{
"last_affected": "1.0.2"
},
{
"introduced": "0"
},
{
"last_affected": "1.0.2-beta1"
},
{
"introduced": "0"
},
{
"last_affected": "1.0.2-beta2"
},
{
"introduced": "0"
},
{
"last_affected": "1.0.2-beta3"
},
{
"introduced": "0"
},
{
"last_affected": "1.0.2a"
},
{
"introduced": "0"
},
{
"last_affected": "1.0.2b"
},
{
"introduced": "0"
},
{
"last_affected": "1.0.2c"
},
{
"introduced": "0"
},
{
"last_affected": "1.0.2d"
},
{
"introduced": "0"
},
{
"last_affected": "1.0.2e"
},
{
"introduced": "0"
},
{
"last_affected": "1.0.2f"
},
{
"introduced": "0"
},
{
"last_affected": "1.0.2g"
},
{
"introduced": "0"
},
{
"last_affected": "4.0"
}
]
}"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2016-2107.json"
[
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "42.1"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "4.0.1"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "4.0.2"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "4.0.3"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "4.0.4"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "5.0.1"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "2.1.2"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "2.1.4"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "12.04"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "14.04"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "16.04"
}
]
}
]