The certificate parser in OpenSSL before 1.0.1u and 1.0.2 before 1.0.2i might allow remote attackers to cause a denial of service (out-of-bounds read) via crafted certificate operations, related to s3clnt.c and s3srvr.c.
{
"versions": [
{
"introduced": "0"
},
{
"last_affected": "1.0.1"
},
{
"introduced": "0"
},
{
"last_affected": "1.0.1a"
},
{
"introduced": "0"
},
{
"last_affected": "1.0.1b"
},
{
"introduced": "0"
},
{
"last_affected": "1.0.1c"
},
{
"introduced": "0"
},
{
"last_affected": "1.0.1d"
},
{
"introduced": "0"
},
{
"last_affected": "1.0.1e"
},
{
"introduced": "0"
},
{
"last_affected": "1.0.1f"
},
{
"introduced": "0"
},
{
"last_affected": "1.0.1g"
},
{
"introduced": "0"
},
{
"last_affected": "1.0.1h"
},
{
"introduced": "0"
},
{
"last_affected": "1.0.1i"
},
{
"introduced": "0"
},
{
"last_affected": "1.0.1j"
},
{
"introduced": "0"
},
{
"last_affected": "1.0.1k"
},
{
"introduced": "0"
},
{
"last_affected": "1.0.1l"
},
{
"introduced": "0"
},
{
"last_affected": "1.0.1m"
},
{
"introduced": "0"
},
{
"last_affected": "1.0.1n"
},
{
"introduced": "0"
},
{
"last_affected": "1.0.1o"
},
{
"introduced": "0"
},
{
"last_affected": "1.0.1p"
},
{
"introduced": "0"
},
{
"last_affected": "1.0.1q"
},
{
"introduced": "0"
},
{
"last_affected": "1.0.1r"
},
{
"introduced": "0"
},
{
"last_affected": "1.0.1s"
},
{
"introduced": "0"
},
{
"last_affected": "1.0.1t"
},
{
"introduced": "0"
},
{
"last_affected": "3.0"
},
{
"introduced": "0"
},
{
"last_affected": "3.0"
},
{
"introduced": "0"
},
{
"last_affected": "10.0"
},
{
"introduced": "0"
},
{
"last_affected": "10.0"
},
{
"introduced": "0"
},
{
"last_affected": "10.0"
},
{
"introduced": "0"
},
{
"last_affected": "12.0"
},
{
"introduced": "0"
},
{
"last_affected": "1.0.2"
},
{
"introduced": "0"
},
{
"last_affected": "1.0.2a"
},
{
"introduced": "0"
},
{
"last_affected": "1.0.2b"
},
{
"introduced": "0"
},
{
"last_affected": "1.0.2c"
},
{
"introduced": "0"
},
{
"last_affected": "1.0.2d"
},
{
"introduced": "0"
},
{
"last_affected": "1.0.2e"
},
{
"introduced": "0"
},
{
"last_affected": "1.0.2f"
},
{
"introduced": "0"
},
{
"last_affected": "1.0.2h"
},
{
"introduced": "0.10.0"
},
{
"fixed": "0.10.47"
},
{
"introduced": "0.12.0"
},
{
"fixed": "0.12.16"
},
{
"introduced": "4.0.0"
},
{
"last_affected": "4.1.2"
},
{
"introduced": "4.2.0"
},
{
"fixed": "4.6.0"
},
{
"introduced": "5.0.0"
},
{
"last_affected": "5.12.0"
},
{
"introduced": "6.0.0"
},
{
"fixed": "6.7.0"
},
{
"introduced": "0"
},
{
"last_affected": "8.0"
}
]
}{
"versions": [
{
"introduced": "0"
},
{
"last_affected": "1.0.1-beta1"
},
{
"introduced": "0"
},
{
"last_affected": "1.0.1-beta2"
},
{
"introduced": "0"
},
{
"last_affected": "1.0.1-beta3"
},
{
"introduced": "0"
},
{
"last_affected": "1.0.2-beta1"
},
{
"introduced": "0"
},
{
"last_affected": "1.0.2-beta2"
},
{
"introduced": "0"
},
{
"last_affected": "1.0.2-beta3"
}
]
}[
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "12.04"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "14.04"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "16.04"
}
]
}
]
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2016-6306.json"