Buffer Over-read in Apple Inc. products - CVE-2016-2176
Published: September 23, 2016 / Updated: January 13, 2017
Vulnerability identifier: #VU642
CSH Severity: Low
CVSSv4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:U/U:Clear
CVE-ID: CVE-2016-2176
CWE-ID: CWE-126
Exploitation vector: Remote access
Exploit availability:
No public exploit available
Vulnerable software:
OpenSSL
Oracle Solaris
macOS
Oracle Access Manager
Oracle Exalogic Infrastructure
PeopleSoft Enterprise PeopleTools
Oracle VM VirtualBox
Oracle E-Business Suite
Oracle Commerce Guided Search
Oracle Agile Engineering Data Management
Primavera P6 Professional Project Management
OpenSSL
Oracle Solaris
macOS
Oracle Access Manager
Oracle Exalogic Infrastructure
PeopleSoft Enterprise PeopleTools
Oracle VM VirtualBox
Oracle E-Business Suite
Oracle Commerce Guided Search
Oracle Agile Engineering Data Management
Primavera P6 Professional Project Management
Software vendor:
OpenSSL Software Foundation
Oracle
Apple Inc.
OpenSSL Software Foundation
Oracle
Apple Inc.
Description
The vulnerability allows a remote to cause buffer over-read on the target system.
The weakness exists due to overread in applications using the X509_NAME_oneline() function on EBCDIC systems. The vulnerability leads to arbitrary stack data return to the buffer.
Successful exploitation of the weakness results in buffer over-read on the vulnerable system.
The weakness exists due to overread in applications using the X509_NAME_oneline() function on EBCDIC systems. The vulnerability leads to arbitrary stack data return to the buffer.
Successful exploitation of the weakness results in buffer over-read on the vulnerable system.
Remediation
Update 1.0.1 to 1.0.1t.
Update 1.0.2 to 1.0.2h.
Update 1.0.2 to 1.0.2h.
External links
- https://www.openssl.org/news/secadv/20160503.txt
- http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
- http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html
- http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html
- https://support.apple.com/cs-cz/HT206903