The DES and Triple DES ciphers, as used in the TLS, SSH, and IPSec protocols and other protocols and products, have a birthday bound of approximately four billion blocks, which makes it easier for remote attackers to obtain cleartext data via a birthday attack against a long-duration encrypted session, as demonstrated by an HTTPS session using Triple DES in CBC mode, aka a "Sweet32" attack.
{
"versions": [
{
"introduced": "0"
},
{
"last_affected": "6.0.0"
},
{
"introduced": "0"
},
{
"last_affected": "2.0.0"
},
{
"introduced": "0"
},
{
"last_affected": "5.0"
},
{
"introduced": "0"
},
{
"last_affected": "6.0"
},
{
"introduced": "0"
},
{
"last_affected": "7.0"
},
{
"introduced": "0.10.0"
},
{
"fixed": "0.10.47"
},
{
"introduced": "0.12.0"
},
{
"fixed": "0.12.16"
},
{
"introduced": "4.0.0"
},
{
"fixed": "4.1.2"
},
{
"introduced": "4.2.0"
},
{
"fixed": "4.6.0"
},
{
"introduced": "6.0.0"
},
{
"fixed": "6.7.0"
}
]
}{
"versions": [
{
"introduced": "0"
},
{
"last_affected": "1.0.0"
},
{
"introduced": "0"
},
{
"last_affected": "3.0"
},
{
"introduced": "3.5.0"
},
{
"fixed": "3.5.3"
},
{
"introduced": "0"
},
{
"last_affected": "1.0.1a"
},
{
"introduced": "0"
},
{
"last_affected": "1.0.1b"
},
{
"introduced": "0"
},
{
"last_affected": "1.0.1c"
},
{
"introduced": "0"
},
{
"last_affected": "1.0.1d"
},
{
"introduced": "0"
},
{
"last_affected": "1.0.1e"
},
{
"introduced": "0"
},
{
"last_affected": "1.0.1f"
},
{
"introduced": "0"
},
{
"last_affected": "1.0.1g"
},
{
"introduced": "0"
},
{
"last_affected": "1.0.1h"
},
{
"introduced": "0"
},
{
"last_affected": "1.0.1i"
},
{
"introduced": "0"
},
{
"last_affected": "1.0.1j"
},
{
"introduced": "0"
},
{
"last_affected": "1.0.1k"
},
{
"introduced": "0"
},
{
"last_affected": "1.0.1l"
},
{
"introduced": "0"
},
{
"last_affected": "1.0.1m"
},
{
"introduced": "0"
},
{
"last_affected": "1.0.1n"
},
{
"introduced": "0"
},
{
"last_affected": "1.0.1o"
},
{
"introduced": "0"
},
{
"last_affected": "1.0.1p"
},
{
"introduced": "0"
},
{
"last_affected": "1.0.1q"
},
{
"introduced": "0"
},
{
"last_affected": "1.0.1r"
},
{
"introduced": "0"
},
{
"last_affected": "1.0.1t"
},
{
"introduced": "0"
},
{
"last_affected": "1.0.2a"
},
{
"introduced": "0"
},
{
"last_affected": "1.0.2b"
},
{
"introduced": "0"
},
{
"last_affected": "1.0.2c"
},
{
"introduced": "0"
},
{
"last_affected": "1.0.2d"
},
{
"introduced": "0"
},
{
"last_affected": "1.0.2e"
},
{
"introduced": "0"
},
{
"last_affected": "1.0.2f"
},
{
"introduced": "0"
},
{
"last_affected": "1.0.2h"
}
]
}[
{
"events": [
{
"introduced": "2.7.0"
},
{
"fixed": "2.7.13"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "9.6.6-068"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "9.7.0-006"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "11.2.0.4"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "12.1.0.2"
}
]
}
]
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2016-2183.json"