{"id":"CVE-2016-2108","details":"The ASN.1 implementation in OpenSSL before 1.0.1o and 1.0.2 before 1.0.2c allows remote attackers to execute arbitrary code or cause a denial of service (buffer underflow and memory corruption) via an ANY field in crafted serialized data, aka the \"negative zero\" issue.","modified":"2026-04-11T12:02:29.890761Z","published":"2016-05-05T01:59:04.230Z","related":["SUSE-SU-2016:1206-1","SUSE-SU-2016:1228-1","SUSE-SU-2016:1231-1","SUSE-SU-2016:1233-1","SUSE-SU-2016:1267-1","SUSE-SU-2016:1290-1","SUSE-SU-2017:0461-1","SUSE-SU-2017:0495-1","SUSE-SU-2017:0585-1","SUSE-SU-2017:0601-1","SUSE-SU-2017:0605-1","SUSE-SU-2017:2699-1","SUSE-SU-2017:2700-1","SUSE-SU-2018:0112-1"],"database_specific":{"unresolved_ranges":[{"extracted_events":[{"last_affected":"4.0.1"}],"source":"CPE_FIELD","cpe":"cpe:2.3:o:google:android:4.0.1:*:*:*:*:*:*:*"},{"extracted_events":[{"last_affected":"4.0.2"}],"source":"CPE_FIELD","cpe":"cpe:2.3:o:google:android:4.0.2:*:*:*:*:*:*:*"},{"extracted_events":[{"last_affected":"4.0.3"}],"source":"CPE_FIELD","cpe":"cpe:2.3:o:google:android:4.0.3:*:*:*:*:*:*:*"},{"extracted_events":[{"last_affected":"4.0.4"}],"source":"CPE_FIELD","cpe":"cpe:2.3:o:google:android:4.0.4:*:*:*:*:*:*:*"},{"extracted_events":[{"last_affected":"4.1.2"}],"source":"CPE_FIELD","cpe":"cpe:2.3:o:google:android:4.1.2:*:*:*:*:*:*:*"},{"extracted_events":[{"last_affected":"4.1"}],"source":"CPE_FIELD","cpe":"cpe:2.3:o:google:android:4.1:*:*:*:*:*:*:*"},{"extracted_events":[{"last_affected":"4.2.1"}],"source":"CPE_FIELD","cpe":"cpe:2.3:o:google:android:4.2.1:*:*:*:*:*:*:*"},{"extracted_events":[{"last_affected":"4.2.2"}],"source":"CPE_FIELD","cpe":"cpe:2.3:o:google:android:4.2.2:*:*:*:*:*:*:*"},{"extracted_events":[{"last_affected":"4.2"}],"source":"CPE_FIELD","cpe":"cpe:2.3:o:google:android:4.2:*:*:*:*:*:*:*"},{"extracted_events":[{"last_affected":"4.3.1"}],"source":"CPE_FIELD","cpe":"cpe:2.3:o:google:android:4.3.1:*:*:*:*:*:*:*"},{"extracted_events":[{"last_affected":"4.3"}],"source":"CPE_FIELD","cpe":"cpe:2.3:o:google:android:4.3:*:*:*:*:*:*:*"},{"extracted_events":[{"last_affected":"4.4.1"}],"source":"CPE_FIELD","cpe":"cpe:2.3:o:google:android:4.4.1:*:*:*:*:*:*:*"},{"extracted_events":[{"last_affected":"4.4.2"}],"source":"CPE_FIELD","cpe":"cpe:2.3:o:google:android:4.4.2:*:*:*:*:*:*:*"},{"extracted_events":[{"last_affected":"4.4.3"}],"source":"CPE_FIELD","cpe":"cpe:2.3:o:google:android:4.4.3:*:*:*:*:*:*:*"},{"extracted_events":[{"last_affected":"4.4"}],"source":"CPE_FIELD","cpe":"cpe:2.3:o:google:android:4.4:*:*:*:*:*:*:*"},{"extracted_events":[{"last_affected":"5.0.1"}],"source":"CPE_FIELD","cpe":"cpe:2.3:o:google:android:5.0.1:*:*:*:*:*:*:*"},{"extracted_events":[{"last_affected":"5.0"}],"source":"CPE_FIELD","cpe":"cpe:2.3:o:google:android:5.0:*:*:*:*:*:*:*"},{"extracted_events":[{"last_affected":"5.1.0"}],"source":"CPE_FIELD","cpe":"cpe:2.3:o:google:android:5.1.0:*:*:*:*:*:*:*"},{"extracted_events":[{"last_affected":"5.1"}],"source":"CPE_FIELD","cpe":"cpe:2.3:o:google:android:5.1:*:*:*:*:*:*:*"},{"extracted_events":[{"last_affected":"6.0.1"}],"source":"CPE_FIELD","cpe":"cpe:2.3:o:google:android:6.0.1:*:*:*:*:*:*:*"},{"extracted_events":[{"last_affected":"6.0"}],"source":"CPE_FIELD","cpe":"cpe:2.3:o:google:android:6.0:*:*:*:*:*:*:*"},{"extracted_events":[{"last_affected":"6.0"}],"source":"CPE_FIELD","cpe":"cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*"},{"extracted_events":[{"last_affected":"7.0"}],"source":"CPE_FIELD","cpe":"cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*"},{"extracted_events":[{"last_affected":"6.0"}],"source":"CPE_FIELD","cpe":"cpe:2.3:o:redhat:enterprise_linux_hpc_node:6.0:*:*:*:*:*:*:*"},{"extracted_events":[{"last_affected":"7.0"}],"source":"CPE_FIELD","cpe":"cpe:2.3:o:redhat:enterprise_linux_hpc_node:7.0:*:*:*:*:*:*:*"},{"extracted_events":[{"last_affected":"7.2"}],"source":"CPE_FIELD","cpe":"cpe:2.3:o:redhat:enterprise_linux_hpc_node_eus:7.2:*:*:*:*:*:*:*"},{"extracted_events":[{"last_affected":"6.0"}],"source":"CPE_FIELD","cpe":"cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*"},{"extracted_events":[{"last_affected":"7.0"}],"source":"CPE_FIELD","cpe":"cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*"},{"extracted_events":[{"last_affected":"7.2"}],"source":"CPE_FIELD","cpe":"cpe:2.3:o:redhat:enterprise_linux_server_aus:7.2:*:*:*:*:*:*:*"},{"extracted_events":[{"last_affected":"7.2"}],"source":"CPE_FIELD","cpe":"cpe:2.3:o:redhat:enterprise_linux_server_eus:7.2:*:*:*:*:*:*:*"},{"extracted_events":[{"last_affected":"6.0"}],"source":"CPE_FIELD","cpe":"cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*"},{"extracted_events":[{"last_affected":"7.0"}],"source":"CPE_FIELD","cpe":"cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*"}]},"references":[{"type":"WEB","url":"http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10759"},{"type":"WEB","url":"http://lists.apple.com/archives/security-announce/2016/Jul/msg00000.html"},{"type":"WEB","url":"http://lists.fedoraproject.org/pipermail/package-announce/2016-May/183457.html"},{"type":"WEB","url":"http://lists.fedoraproject.org/pipermail/package-announce/2016-May/183607.html"},{"type":"WEB","url":"http://lists.fedoraproject.org/pipermail/package-announce/2016-May/184605.html"},{"type":"WEB","url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00001.html"},{"type":"WEB","url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00008.html"},{"type":"WEB","url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00010.html"},{"type":"WEB","url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00011.html"},{"type":"WEB","url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00013.html"},{"type":"WEB","url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00014.html"},{"type":"WEB","url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00015.html"},{"type":"WEB","url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00016.html"},{"type":"WEB","url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00017.html"},{"type":"WEB","url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00018.html"},{"type":"WEB","url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00019.html"},{"type":"WEB","url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00029.html"},{"type":"WEB","url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00030.html"},{"type":"WEB","url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00036.html"},{"type":"WEB","url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00055.html"},{"type":"WEB","url":"http://packetstormsecurity.com/files/136912/Slackware-Security-Advisory-openssl-Updates.html"},{"type":"WEB","url":"http://source.android.com/security/bulletin/2016-07-01.html"},{"type":"WEB","url":"http://support.citrix.com/article/CTX212736"},{"type":"WEB","url":"http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160504-openssl"},{"type":"WEB","url":"http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html"},{"type":"WEB","url":"http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html"},{"type":"WEB","url":"http://www.securityfocus.com/bid/89752"},{"type":"WEB","url":"http://www.securityfocus.com/bid/91787"},{"type":"WEB","url":"http://www.securitytracker.com/id/1035721"},{"type":"WEB","url":"http://www.slackware.com/security/viewer.php?l=slackware-security&y=2016&m=slackware-security.542103"},{"type":"WEB","url":"https://cert-portal.siemens.com/productcert/pdf/ssa-412672.pdf"},{"type":"WEB","url":"https://git.openssl.org/?p=openssl.git%3Ba=commit%3Bh=3661bb4e7934668bd99ca777ea8b30eedfafa871"},{"type":"WEB","url":"https://git.openssl.org/?p=openssl.git%3Ba=commit%3Bh=f5da52e308a6aeea6d5f3df98c4da295d7e9cc27"},{"type":"WEB","url":"https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbgn03726en_us"},{"type":"WEB","url":"https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03756en_us"},{"type":"WEB","url":"https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03765en_us"},{"type":"WEB","url":"https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05149345"},{"type":"WEB","url":"https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05164862"},{"type":"WEB","url":"https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05386804"},{"type":"WEB","url":"https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA40202"},{"type":"WEB","url":"https://support.apple.com/HT206903"},{"type":"WEB","url":"https://www.tenable.com/security/tns-2016-18"},{"type":"ADVISORY","url":"http://rhn.redhat.com/errata/RHSA-2016-0722.html"},{"type":"ADVISORY","url":"http://rhn.redhat.com/errata/RHSA-2016-0996.html"},{"type":"ADVISORY","url":"http://rhn.redhat.com/errata/RHSA-2016-2056.html"},{"type":"ADVISORY","url":"http://rhn.redhat.com/errata/RHSA-2016-2073.html"},{"type":"ADVISORY","url":"http://rhn.redhat.com/errata/RHSA-2016-2957.html"},{"type":"ADVISORY","url":"http://www.debian.org/security/2016/dsa-3566"},{"type":"ADVISORY","url":"http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html"},{"type":"ADVISORY","url":"http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html"},{"type":"ADVISORY","url":"http://www.ubuntu.com/usn/USN-2959-1"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2016:1137"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2017:0193"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2017:0194"},{"type":"ADVISORY","url":"https://bto.bluecoat.com/security-advisory/sa123"},{"type":"ADVISORY","url":"https://security-center.intel.com/advisory.aspx?intelid=INTEL-SA-00067&languageid=en-fr"},{"type":"ADVISORY","url":"https://security.gentoo.org/glsa/201612-16"},{"type":"ADVISORY","url":"https://security.netapp.com/advisory/ntap-20160504-0001/"},{"type":"ADVISORY","url":"https://www.openssl.org/news/secadv/20160503.txt"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/openssl/openssl","events":[{"introduced":"0"},{"last_affected":"888759a1d38197f29de7227876c3b58fbff8549f"},{"last_affected":"e818b74be2170fbe957a07b0da4401c2b694b3b8"},{"last_affected":"94f416601754dbe65e287f8e1eca01fa32f74a7a"},{"last_affected":"2f63ad1c6daa61614f3d58de0889bf68e9f75853"},{"last_affected":"2c5db8dac3a06fe5b2c889838a606138ee3542ed"},{"last_affected":"00a7e5ea1e51f58180cd7aa4028e998949a36d66"}],"database_specific":{"extracted_events":[{"introduced":"0"},{"last_affected":"1.0.1n"},{"last_affected":"1.0.2"},{"last_affected":"1.0.2-beta1"},{"last_affected":"1.0.2-beta2"},{"last_affected":"1.0.2-beta3"},{"last_affected":"1.0.2a"},{"last_affected":"1.0.2b"},{"last_affected":"4.0"}],"source":"CPE_FIELD","cpe":["cpe:2.3:a:openssl:openssl:*:*:*:*:*:*:*:*","cpe:2.3:a:openssl:openssl:1.0.2:*:*:*:*:*:*:*","cpe:2.3:a:openssl:openssl:1.0.2:beta1:*:*:*:*:*:*","cpe:2.3:a:openssl:openssl:1.0.2:beta2:*:*:*:*:*:*","cpe:2.3:a:openssl:openssl:1.0.2:beta3:*:*:*:*:*:*","cpe:2.3:a:openssl:openssl:1.0.2a:*:*:*:*:*:*:*","cpe:2.3:a:openssl:openssl:1.0.2b:*:*:*:*:*:*:*","cpe:2.3:o:google:android:4.0:*:*:*:*:*:*:*"]}}],"versions":["4.0-PRE-CLANG-FORMAT-WEBKIT","BEFORE_engine","OpenSSL_0_9_1c","OpenSSL_0_9_2b","OpenSSL_0_9_3","OpenSSL_0_9_3a","OpenSSL_0_9_3beta2","OpenSSL_0_9_4","OpenSSL_0_9_5a","OpenSSL_0_9_5a-beta1","OpenSSL_0_9_5a-beta2","OpenSSL_0_9_5beta1","OpenSSL_0_9_5beta2","OpenSSL_0_9_6-beta3","OpenSSL_1_0_1","OpenSSL_1_0_1-beta1","OpenSSL_1_0_1-beta2","OpenSSL_1_0_1-beta3","OpenSSL_1_0_1-post-auto-reformat","OpenSSL_1_0_1-post-reformat","OpenSSL_1_0_1-pre-auto-reformat","OpenSSL_1_0_1-pre-reformat","OpenSSL_1_0_1a","OpenSSL_1_0_1b","OpenSSL_1_0_1c","OpenSSL_1_0_1d","OpenSSL_1_0_1e","OpenSSL_1_0_1f","OpenSSL_1_0_1g","OpenSSL_1_0_1h","OpenSSL_1_0_1i","OpenSSL_1_0_1j","OpenSSL_1_0_1k","OpenSSL_1_0_1l","OpenSSL_1_0_1m","OpenSSL_1_0_1n","OpenSSL_1_0_1o","OpenSSL_1_0_1p","OpenSSL_1_0_1q","OpenSSL_1_0_1r","OpenSSL_1_0_1s","OpenSSL_1_0_1t","OpenSSL_1_0_1u","OpenSSL_1_0_2","OpenSSL_1_0_2-beta1","OpenSSL_1_0_2-beta2","OpenSSL_1_0_2-beta3","OpenSSL_1_0_2-post-auto-reformat","OpenSSL_1_0_2-post-reformat","OpenSSL_1_0_2-pre-auto-reformat","OpenSSL_1_0_2-pre-reformat","OpenSSL_1_0_2a","OpenSSL_1_0_2b","OpenSSL_1_0_2c","OpenSSL_1_0_2d","OpenSSL_1_0_2e","OpenSSL_1_0_2f","OpenSSL_1_0_2g","OpenSSL_1_0_2h","OpenSSL_1_0_2i","OpenSSL_1_0_2j","OpenSSL_1_0_2k","OpenSSL_1_0_2l","OpenSSL_1_0_2m","OpenSSL_1_0_2n","OpenSSL_1_0_2o","OpenSSL_1_0_2p","OpenSSL_1_0_2q","OpenSSL_1_0_2r","OpenSSL_1_0_2s","OpenSSL_1_0_2t","OpenSSL_1_0_2u","OpenSSL_1_1_0-pre1","OpenSSL_1_1_0-pre2","OpenSSL_1_1_0-pre3","OpenSSL_1_1_0-pre4","OpenSSL_1_1_0-pre5","OpenSSL_1_1_0-pre6","OpenSSL_1_1_1","OpenSSL_1_1_1-pre1","OpenSSL_1_1_1-pre2","OpenSSL_1_1_1-pre3","OpenSSL_1_1_1-pre4","OpenSSL_1_1_1-pre5","OpenSSL_1_1_1-pre6","OpenSSL_1_1_1-pre7","OpenSSL_1_1_1-pre8","OpenSSL_1_1_1-pre9","master-post-auto-reformat","master-post-reformat","master-pre-auto-reformat","master-pre-reformat","openssl-3.0.0-alpha1","openssl-3.0.0-alpha10","openssl-3.0.0-alpha11","openssl-3.0.0-alpha12","openssl-3.0.0-alpha13","openssl-3.0.0-alpha14","openssl-3.0.0-alpha15","openssl-3.0.0-alpha16","openssl-3.0.0-alpha17","openssl-3.0.0-alpha2","openssl-3.0.0-alpha3","openssl-3.0.0-alpha4","openssl-3.0.0-alpha5","openssl-3.0.0-alpha6","openssl-3.0.0-alpha7","openssl-3.0.0-alpha8","openssl-3.0.0-alpha9","openssl-3.0.0-beta1","openssl-3.0.0-beta2","openssl-3.2.0-alpha1","openssl-3.2.0-alpha2","openssl-3.4.0-alpha1"],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2016-2108.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}]}