#VU639 Traffic decryption in Apple Inc. products - CVE-2016-2107
Published: September 23, 2016 / Updated: September 14, 2018
Vulnerability identifier: #VU639
Vulnerability risk: High
CVSSv4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/U:Amber
CVE-ID: CVE-2016-2107
CWE-ID: CWE-284
Exploitation vector: Remote access
Exploit availability:
Public exploit is available
Vulnerable software:
OpenSSL
Oracle Solaris
Oracle Linux
macOS
Oracle Access Manager
Oracle Exalogic Infrastructure
Oracle Enterprise Manager Ops Center
Enterprise Manager Base Platform
Oracle Agile Engineering Data Management
Oracle Business Intelligence Enterprise Edition
Oracle Transportation Management
Oracle Enterprise Session Border Controller
Oracle Life Sciences Data Hub
Primavera P6 Professional Project Management
PeopleSoft Enterprise PeopleTools
Oracle Communications Unified Session Manager
Oracle VM VirtualBox
Oracle Secure Global Desktop
Oracle E-Business Suite
Oracle Commerce Guided Search
OpenSSL
Oracle Solaris
Oracle Linux
macOS
Oracle Access Manager
Oracle Exalogic Infrastructure
Oracle Enterprise Manager Ops Center
Enterprise Manager Base Platform
Oracle Agile Engineering Data Management
Oracle Business Intelligence Enterprise Edition
Oracle Transportation Management
Oracle Enterprise Session Border Controller
Oracle Life Sciences Data Hub
Primavera P6 Professional Project Management
PeopleSoft Enterprise PeopleTools
Oracle Communications Unified Session Manager
Oracle VM VirtualBox
Oracle Secure Global Desktop
Oracle E-Business Suite
Oracle Commerce Guided Search
Software vendor:
OpenSSL Software Foundation
Oracle
Apple Inc.
OpenSSL Software Foundation
Oracle
Apple Inc.
Description
The vulnerability allows a remote user to decrypt traffic on the target system.
The weakness is due to access control error.If the connection uses an AES CBC cipher and the server support AES-NI attackers can perform padding oracle attack.
Successful exploitation of the vulnerability leads to traffic decryption on the vulnerable system.
The weakness is due to access control error.If the connection uses an AES CBC cipher and the server support AES-NI attackers can perform padding oracle attack.
Successful exploitation of the vulnerability leads to traffic decryption on the vulnerable system.
Remediation
Update 1.0.1 to 1.0.1t.
Update 1.0.2 to 1.0.2h.
Update 1.0.2 to 1.0.2h.
External links
- https://www.openssl.org/news/secadv/20160503.tx
- http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
- http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html
- http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html
- https://support.apple.com/cs-cz/HT206903