{"id":"CVE-2016-2109","details":"The asn1_d2i_read_bio function in crypto/asn1/a_d2i_fp.c in the ASN.1 BIO implementation in OpenSSL before 1.0.1t and 1.0.2 before 1.0.2h allows remote attackers to cause a denial of service (memory consumption) via a short invalid encoding.","modified":"2026-04-16T01:43:46.220721552Z","published":"2016-05-05T01:59:05.357Z","related":["SUSE-FU-2022:0445-1","SUSE-SU-2016:1206-1","SUSE-SU-2016:1228-1","SUSE-SU-2016:1231-1","SUSE-SU-2016:1233-1","SUSE-SU-2016:1267-1","SUSE-SU-2016:1290-1","SUSE-SU-2017:2699-1","SUSE-SU-2017:2700-1","openSUSE-SU-2024:10271-1","openSUSE-SU-2024:10529-1","openSUSE-SU-2024:11127-1"],"database_specific":{"unresolved_ranges":[{"cpe":"cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*","source":"CPE_FIELD","extracted_events":[{"last_affected":"6.0"}]},{"cpe":"cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*","source":"CPE_FIELD","extracted_events":[{"last_affected":"7.0"}]},{"cpe":"cpe:2.3:o:redhat:enterprise_linux_hpc_node:6.0:*:*:*:*:*:*:*","source":"CPE_FIELD","extracted_events":[{"last_affected":"6.0"}]},{"cpe":"cpe:2.3:o:redhat:enterprise_linux_hpc_node:7.0:*:*:*:*:*:*:*","source":"CPE_FIELD","extracted_events":[{"last_affected":"7.0"}]},{"cpe":"cpe:2.3:o:redhat:enterprise_linux_hpc_node_eus:7.2:*:*:*:*:*:*:*","source":"CPE_FIELD","extracted_events":[{"last_affected":"7.2"}]},{"cpe":"cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*","source":"CPE_FIELD","extracted_events":[{"last_affected":"6.0"}]},{"cpe":"cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*","source":"CPE_FIELD","extracted_events":[{"last_affected":"7.0"}]},{"cpe":"cpe:2.3:o:redhat:enterprise_linux_server_aus:7.2:*:*:*:*:*:*:*","source":"CPE_FIELD","extracted_events":[{"last_affected":"7.2"}]},{"cpe":"cpe:2.3:o:redhat:enterprise_linux_server_eus:7.2:*:*:*:*:*:*:*","source":"CPE_FIELD","extracted_events":[{"last_affected":"7.2"}]},{"cpe":"cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*","source":"CPE_FIELD","extracted_events":[{"last_affected":"6.0"}]},{"cpe":"cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*","source":"CPE_FIELD","extracted_events":[{"last_affected":"7.0"}]}]},"references":[{"type":"WEB","url":"http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10759"},{"type":"WEB","url":"http://lists.apple.com/archives/security-announce/2016/Jul/msg00000.html"},{"type":"WEB","url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00001.html"},{"type":"WEB","url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00008.html"},{"type":"WEB","url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00010.html"},{"type":"WEB","url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00011.html"},{"type":"WEB","url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00013.html"},{"type":"WEB","url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00014.html"},{"type":"WEB","url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00015.html"},{"type":"WEB","url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00016.html"},{"type":"WEB","url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00017.html"},{"type":"WEB","url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00018.html"},{"type":"WEB","url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00019.html"},{"type":"WEB","url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00029.html"},{"type":"WEB","url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00030.html"},{"type":"WEB","url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00036.html"},{"type":"WEB","url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00055.html"},{"type":"WEB","url":"http://packetstormsecurity.com/files/136912/Slackware-Security-Advisory-openssl-Updates.html"},{"type":"WEB","url":"http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160504-openssl"},{"type":"WEB","url":"http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html"},{"type":"WEB","url":"http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html"},{"type":"WEB","url":"http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html"},{"type":"WEB","url":"http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html"},{"type":"WEB","url":"http://www.securityfocus.com/bid/87940"},{"type":"WEB","url":"http://www.securityfocus.com/bid/91787"},{"type":"WEB","url":"http://www.securitytracker.com/id/1035721"},{"type":"WEB","url":"http://www.slackware.com/security/viewer.php?l=slackware-security&y=2016&m=slackware-security.542103"},{"type":"WEB","url":"https://cert-portal.siemens.com/productcert/pdf/ssa-412672.pdf"},{"type":"WEB","url":"https://git.openssl.org/?p=openssl.git%3Ba=commit%3Bh=c62981390d6cf9e3d612c489b8b77c2913b25807"},{"type":"WEB","url":"https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03756en_us"},{"type":"WEB","url":"https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03765en_us"},{"type":"WEB","url":"https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05320149"},{"type":"WEB","url":"https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722"},{"type":"WEB","url":"https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA40202"},{"type":"WEB","url":"https://kc.mcafee.com/corporate/index?page=content&id=SB10160"},{"type":"WEB","url":"https://source.android.com/security/bulletin/2017-07-01"},{"type":"WEB","url":"https://support.apple.com/HT206903"},{"type":"WEB","url":"https://www.tenable.com/security/tns-2016-18"},{"type":"ADVISORY","url":"http://rhn.redhat.com/errata/RHSA-2016-0722.html"},{"type":"ADVISORY","url":"http://rhn.redhat.com/errata/RHSA-2016-0996.html"},{"type":"ADVISORY","url":"http://rhn.redhat.com/errata/RHSA-2016-2056.html"},{"type":"ADVISORY","url":"http://rhn.redhat.com/errata/RHSA-2016-2073.html"},{"type":"ADVISORY","url":"http://rhn.redhat.com/errata/RHSA-2016-2957.html"},{"type":"ADVISORY","url":"http://www.debian.org/security/2016/dsa-3566"},{"type":"ADVISORY","url":"http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html"},{"type":"ADVISORY","url":"http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html"},{"type":"ADVISORY","url":"http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html"},{"type":"ADVISORY","url":"http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html"},{"type":"ADVISORY","url":"http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html"},{"type":"ADVISORY","url":"http://www.ubuntu.com/usn/USN-2959-1"},{"type":"ADVISORY","url":"https://bto.bluecoat.com/security-advisory/sa123"},{"type":"ADVISORY","url":"https://security.gentoo.org/glsa/201612-16"},{"type":"ADVISORY","url":"https://security.netapp.com/advisory/ntap-20160504-0001/"},{"type":"ADVISORY","url":"https://www.freebsd.org/security/advisories/FreeBSD-SA-16:17.openssl.asc"},{"type":"ADVISORY","url":"https://www.openssl.org/news/secadv/20160503.txt"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/openssl/openssl","events":[{"introduced":"0"},{"last_affected":"888759a1d38197f29de7227876c3b58fbff8549f"},{"last_affected":"e818b74be2170fbe957a07b0da4401c2b694b3b8"},{"last_affected":"94f416601754dbe65e287f8e1eca01fa32f74a7a"},{"last_affected":"2f63ad1c6daa61614f3d58de0889bf68e9f75853"},{"last_affected":"2c5db8dac3a06fe5b2c889838a606138ee3542ed"}],"database_specific":{"cpe":["cpe:2.3:a:openssl:openssl:*:*:*:*:*:*:*:*","cpe:2.3:a:openssl:openssl:1.0.2:*:*:*:*:*:*:*","cpe:2.3:a:openssl:openssl:1.0.2:beta1:*:*:*:*:*:*","cpe:2.3:a:openssl:openssl:1.0.2:beta2:*:*:*:*:*:*","cpe:2.3:a:openssl:openssl:1.0.2:beta3:*:*:*:*:*:*","cpe:2.3:a:openssl:openssl:1.0.2a:*:*:*:*:*:*:*","cpe:2.3:a:openssl:openssl:1.0.2b:*:*:*:*:*:*:*","cpe:2.3:a:openssl:openssl:1.0.2c:*:*:*:*:*:*:*","cpe:2.3:a:openssl:openssl:1.0.2d:*:*:*:*:*:*:*","cpe:2.3:a:openssl:openssl:1.0.2e:*:*:*:*:*:*:*","cpe:2.3:a:openssl:openssl:1.0.2f:*:*:*:*:*:*:*","cpe:2.3:a:openssl:openssl:1.0.2g:*:*:*:*:*:*:*"],"source":"CPE_FIELD","extracted_events":[{"introduced":"0"},{"last_affected":"1.0.1s"},{"last_affected":"1.0.2"},{"last_affected":"1.0.2-beta1"},{"last_affected":"1.0.2-beta2"},{"last_affected":"1.0.2-beta3"},{"last_affected":"1.0.2a"},{"last_affected":"1.0.2b"},{"last_affected":"1.0.2c"},{"last_affected":"1.0.2d"},{"last_affected":"1.0.2e"},{"last_affected":"1.0.2f"},{"last_affected":"1.0.2g"}]}}],"versions":["OpenSSL_1_0_1","OpenSSL_1_0_1-beta1","OpenSSL_1_0_1-beta2","OpenSSL_1_0_1-beta3","OpenSSL_1_0_1-post-auto-reformat","OpenSSL_1_0_1-post-reformat","OpenSSL_1_0_1-pre-auto-reformat","OpenSSL_1_0_1-pre-reformat","OpenSSL_1_0_1a","OpenSSL_1_0_1b","OpenSSL_1_0_1c","OpenSSL_1_0_1d","OpenSSL_1_0_1e","OpenSSL_1_0_1f","OpenSSL_1_0_1g","OpenSSL_1_0_1h","OpenSSL_1_0_1i","OpenSSL_1_0_1j","OpenSSL_1_0_1k","OpenSSL_1_0_1l","OpenSSL_1_0_1m","OpenSSL_1_0_1n","OpenSSL_1_0_1o","OpenSSL_1_0_1p","OpenSSL_1_0_1q","OpenSSL_1_0_1r","OpenSSL_1_0_1s","OpenSSL_1_0_1t","OpenSSL_1_0_1u","OpenSSL_1_0_2","OpenSSL_1_0_2-beta1","OpenSSL_1_0_2-beta2","OpenSSL_1_0_2-beta3","OpenSSL_1_0_2-post-auto-reformat","OpenSSL_1_0_2-post-reformat","OpenSSL_1_0_2-pre-auto-reformat","OpenSSL_1_0_2-pre-reformat","OpenSSL_1_0_2a","OpenSSL_1_0_2b","OpenSSL_1_0_2c","OpenSSL_1_0_2d","OpenSSL_1_0_2e","OpenSSL_1_0_2f","OpenSSL_1_0_2g","OpenSSL_1_0_2h","OpenSSL_1_0_2i","OpenSSL_1_0_2j","OpenSSL_1_0_2k","OpenSSL_1_0_2l","OpenSSL_1_0_2m","OpenSSL_1_0_2n","OpenSSL_1_0_2o","OpenSSL_1_0_2p","OpenSSL_1_0_2q","OpenSSL_1_0_2r","OpenSSL_1_0_2s","OpenSSL_1_0_2t","OpenSSL_1_0_2u"],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2016-2109.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}]}