{"id":"CVE-2016-2183","details":"The DES and Triple DES ciphers, as used in the TLS, SSH, and IPSec protocols and other protocols and products, have a birthday bound of approximately four billion blocks, which makes it easier for remote attackers to obtain cleartext data via a birthday attack against a long-duration encrypted session, as demonstrated by an HTTPS session using Triple DES in CBC mode, aka a \"Sweet32\" attack.","aliases":["PSF-2016-4"],"modified":"2026-04-16T01:42:04.107568851Z","published":"2016-09-01T00:59:00.137Z","related":["SUSE-FU-2022:0445-1","SUSE-SU-2016:2387-1","SUSE-SU-2016:2394-1","SUSE-SU-2016:2458-1","SUSE-SU-2016:2468-1","SUSE-SU-2016:2469-1","SUSE-SU-2016:2470-1","SUSE-SU-2016:2470-2","SUSE-SU-2016:2545-1","SUSE-SU-2017:0346-1","SUSE-SU-2017:0460-1","SUSE-SU-2017:0490-1","SUSE-SU-2017:0716-1","SUSE-SU-2017:0719-1","SUSE-SU-2017:0720-1","SUSE-SU-2017:0726-1","SUSE-SU-2017:0839-1","SUSE-SU-2017:1389-1","SUSE-SU-2017:1444-1","SUSE-SU-2017:2699-1","SUSE-SU-2017:2700-1","SUSE-SU-2019:14246-1","openSUSE-SU-2024:10247-1","openSUSE-SU-2024:10271-1","openSUSE-SU-2024:10876-1","openSUSE-SU-2024:11127-1","openSUSE-SU-2024:11130-1"],"references":[{"type":"WEB","url":"https://access.redhat.com/articles/2548661"},{"type":"WEB","url":"https://cert-portal.siemens.com/productcert/pdf/ssa-412672.pdf"},{"type":"WEB","url":"https://nakedsecurity.sophos.com/2016/08/25/anatomy-of-a-cryptographic-collision-the-sweet32-attack/"},{"type":"WEB","url":"https://www.vicarius.io/vsociety/posts/cve-2016-2183-detection-sweet32-vulnerability"},{"type":"WEB","url":"https://www.vicarius.io/vsociety/posts/cve-2016-2183-mitigate-sweet32-vulnerability"},{"type":"ADVISORY","url":"http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10759"},{"type":"ADVISORY","url":"http://lists.opensuse.org/opensuse-security-announce/2016-09/msg00022.html"},{"type":"ADVISORY","url":"http://lists.opensuse.org/opensuse-security-announce/2016-09/msg00023.html"},{"type":"ADVISORY","url":"http://lists.opensuse.org/opensuse-security-announce/2016-09/msg00024.html"},{"type":"ADVISORY","url":"http://lists.opensuse.org/opensuse-security-announce/2016-09/msg00031.html"},{"type":"ADVISORY","url":"http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00005.html"},{"type":"ADVISORY","url":"http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00011.html"},{"type":"ADVISORY","url":"http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00012.html"},{"type":"ADVISORY","url":"http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00013.html"},{"type":"ADVISORY","url":"http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00021.html"},{"type":"ADVISORY","url":"http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00029.html"},{"type":"ADVISORY","url":"http://lists.opensuse.org/opensuse-security-announce/2017-01/msg00068.html"},{"type":"ADVISORY","url":"http://lists.opensuse.org/opensuse-security-announce/2017-02/msg00003.html"},{"type":"ADVISORY","url":"http://lists.opensuse.org/opensuse-security-announce/2017-02/msg00023.html"},{"type":"ADVISORY","url":"http://lists.opensuse.org/opensuse-security-announce/2017-02/msg00028.html"},{"type":"ADVISORY","url":"http://lists.opensuse.org/opensuse-security-announce/2017-02/msg00032.html"},{"type":"ADVISORY","url":"http://lists.opensuse.org/opensuse-security-announce/2017-05/msg00076.html"},{"type":"ADVISORY","url":"http://lists.opensuse.org/opensuse-security-announce/2017-10/msg00010.html"},{"type":"ADVISORY","url":"http://lists.opensuse.org/opensuse-security-announce/2017-10/msg00011.html"},{"type":"ADVISORY","url":"http://lists.opensuse.org/opensuse-security-announce/2018-02/msg00032.html"},{"type":"ADVISORY","url":"http://packetstormsecurity.com/files/142756/IBM-Informix-Dynamic-Server-DLL-Injection-Code-Execution.html"},{"type":"ADVISORY","url":"http://rhn.redhat.com/errata/RHSA-2017-0336.html"},{"type":"ADVISORY","url":"http://rhn.redhat.com/errata/RHSA-2017-0337.html"},{"type":"ADVISORY","url":"http://rhn.redhat.com/errata/RHSA-2017-0338.html"},{"type":"ADVISORY","url":"http://rhn.redhat.com/errata/RHSA-2017-0462.html"},{"type":"ADVISORY","url":"http://seclists.org/fulldisclosure/2017/Jul/31"},{"type":"ADVISORY","url":"http://seclists.org/fulldisclosure/2017/May/105"},{"type":"ADVISORY","url":"http://www-01.ibm.com/support/docview.wss?uid=nas8N1021697"},{"type":"ADVISORY","url":"http://www-01.ibm.com/support/docview.wss?uid=swg21991482"},{"type":"ADVISORY","url":"http://www-01.ibm.com/support/docview.wss?uid=swg21995039"},{"type":"ADVISORY","url":"http://www.debian.org/security/2016/dsa-3673"},{"type":"ADVISORY","url":"http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20170322-01-openssl-en"},{"type":"ADVISORY","url":"http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html"},{"type":"ADVISORY","url":"http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html"},{"type":"ADVISORY","url":"http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html"},{"type":"ADVISORY","url":"http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html"},{"type":"ADVISORY","url":"http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html"},{"type":"ADVISORY","url":"http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2016-3090545.html"},{"type":"ADVISORY","url":"http://www.oracle.com/technetwork/topics/security/ovmbulletinoct2016-3090547.html"},{"type":"ADVISORY","url":"http://www.securityfocus.com/archive/1/539885/100/0/threaded"},{"type":"ADVISORY","url":"http://www.securityfocus.com/archive/1/540341/100/0/threaded"},{"type":"ADVISORY","url":"http://www.securityfocus.com/archive/1/541104/100/0/threaded"},{"type":"ADVISORY","url":"http://www.securityfocus.com/archive/1/542005/100/0/threaded"},{"type":"ADVISORY","url":"http://www.securityfocus.com/archive/1/archive/1/539885/100/0/threaded"},{"type":"ADVISORY","url":"http://www.securityfocus.com/archive/1/archive/1/540129/100/0/threaded"},{"type":"ADVISORY","url":"http://www.securityfocus.com/archive/1/archive/1/540341/100/0/threaded"},{"type":"ADVISORY","url":"http://www.securityfocus.com/archive/1/archive/1/541104/100/0/threaded"},{"type":"ADVISORY","url":"http://www.securityfocus.com/archive/1/archive/1/542005/100/0/threaded"},{"type":"ADVISORY","url":"http://www.securityfocus.com/bid/92630"},{"type":"ADVISORY","url":"http://www.securityfocus.com/bid/95568"},{"type":"ADVISORY","url":"http://www.securitytracker.com/id/1036696"},{"type":"ADVISORY","url":"http://www.splunk.com/view/SP-CAAAPSV"},{"type":"ADVISORY","url":"http://www.splunk.com/view/SP-CAAAPUE"},{"type":"ADVISORY","url":"http://www.ubuntu.com/usn/USN-3087-1"},{"type":"ADVISORY","url":"http://www.ubuntu.com/usn/USN-3087-2"},{"type":"ADVISORY","url":"http://www.ubuntu.com/usn/USN-3179-1"},{"type":"ADVISORY","url":"http://www.ubuntu.com/usn/USN-3194-1"},{"type":"ADVISORY","url":"http://www.ubuntu.com/usn/USN-3198-1"},{"type":"ADVISORY","url":"http://www.ubuntu.com/usn/USN-3270-1"},{"type":"ADVISORY","url":"http://www.ubuntu.com/usn/USN-3372-1"},{"type":"ADVISORY","url":"https://access.redhat.com/articles/2548661"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2017:1216"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2017:2708"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2017:2709"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2017:2710"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2017:3113"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2017:3114"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2017:3239"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2017:3240"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2018:2123"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2019:1245"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2019:2859"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2020:0451"},{"type":"ADVISORY","url":"https://access.redhat.com/security/cve/cve-2016-2183"},{"type":"ADVISORY","url":"https://blog.cryptographyengineering.com/2016/08/24/attack-of-week-64-bit-ciphers-in-tls/"},{"type":"ADVISORY","url":"https://bto.bluecoat.com/security-advisory/sa133"},{"type":"ADVISORY","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1369383"},{"type":"ADVISORY","url":"https://github.com/ssllabs/ssllabs-scan/issues/387#issuecomment-242514633"},{"type":"ADVISORY","url":"https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c05302448"},{"type":"ADVISORY","url":"https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c05369403"},{"type":"ADVISORY","url":"https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c05369415"},{"type":"ADVISORY","url":"https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c05385680"},{"type":"ADVISORY","url":"https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c05390722"},{"type":"ADVISORY","url":"https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c05390849"},{"type":"ADVISORY","url":"https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbgn03765en_us"},{"type":"ADVISORY","url":"https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03725en_us"},{"type":"ADVISORY","url":"https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05302448"},{"type":"ADVISORY","url":"https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05309984"},{"type":"ADVISORY","url":"https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05323116"},{"type":"ADVISORY","url":"https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05349499"},{"type":"ADVISORY","url":"https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05356388"},{"type":"ADVISORY","url":"https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05369403"},{"type":"ADVISORY","url":"https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05369415"},{"type":"ADVISORY","url":"https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05385680"},{"type":"ADVISORY","url":"https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722"},{"type":"ADVISORY","url":"https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390849"},{"type":"ADVISORY","url":"https://ics-cert.us-cert.gov/advisories/ICSMA-18-058-02"},{"type":"ADVISORY","url":"https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA40312"},{"type":"ADVISORY","url":"https://kc.mcafee.com/corporate/index?page=content&id=SB10171"},{"type":"ADVISORY","url":"https://kc.mcafee.com/corporate/index?page=content&id=SB10186"},{"type":"ADVISORY","url":"https://kc.mcafee.com/corporate/index?page=content&id=SB10197"},{"type":"ADVISORY","url":"https://kc.mcafee.com/corporate/index?page=content&id=SB10215"},{"type":"ADVISORY","url":"https://kc.mcafee.com/corporate/index?page=content&id=SB10310"},{"type":"ADVISORY","url":"https://nakedsecurity.sophos.com/2016/08/25/anatomy-of-a-cryptographic-collision-the-sweet32-attack/"},{"type":"ADVISORY","url":"https://nodejs.org/en/blog/vulnerability/september-2016-security-releases/"},{"type":"ADVISORY","url":"https://seclists.org/bugtraq/2018/Nov/21"},{"type":"ADVISORY","url":"https://security.gentoo.org/glsa/201612-16"},{"type":"ADVISORY","url":"https://security.gentoo.org/glsa/201701-65"},{"type":"ADVISORY","url":"https://security.gentoo.org/glsa/201707-01"},{"type":"ADVISORY","url":"https://security.netapp.com/advisory/ntap-20160915-0001/"},{"type":"ADVISORY","url":"https://security.netapp.com/advisory/ntap-20170119-0001/"},{"type":"ADVISORY","url":"https://softwaresupport.softwaregrp.com/document/-/facetsearch/document/KM03158613"},{"type":"ADVISORY","url":"https://softwaresupport.softwaregrp.com/document/-/facetsearch/document/KM03286178"},{"type":"ADVISORY","url":"https://support.f5.com/csp/article/K13167034"},{"type":"ADVISORY","url":"https://sweet32.info/"},{"type":"ADVISORY","url":"https://wiki.opendaylight.org/view/Security_Advisories"},{"type":"ADVISORY","url":"https://www.arista.com/en/support/advisories-notices/security-advisories/1749-security-advisory-24"},{"type":"ADVISORY","url":"https://www.exploit-db.com/exploits/42091/"},{"type":"ADVISORY","url":"https://www.ietf.org/mail-archive/web/tls/current/msg04560.html"},{"type":"ADVISORY","url":"https://www.mitel.com/en-ca/support/security-advisories/mitel-product-security-advisory-17-0008"},{"type":"ADVISORY","url":"https://www.nccgroup.trust/us/about-us/newsroom-and-events/blog/2016/august/new-practical-attacks-on-64-bit-block-ciphers-3des-blowfish/"},{"type":"ADVISORY","url":"https://www.openssl.org/blog/blog/2016/08/24/sweet32/"},{"type":"ADVISORY","url":"https://www.oracle.com/security-alerts/cpuapr2020.html"},{"type":"ADVISORY","url":"https://www.oracle.com/security-alerts/cpujan2020.html"},{"type":"ADVISORY","url":"https://www.oracle.com/security-alerts/cpujul2020.html"},{"type":"ADVISORY","url":"https://www.oracle.com/security-alerts/cpuoct2020.html"},{"type":"ADVISORY","url":"https://www.oracle.com/security-alerts/cpuoct2021.html"},{"type":"ADVISORY","url":"https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html"},{"type":"ADVISORY","url":"https://www.sigsac.org/ccs/CCS2016/accepted-papers/"},{"type":"ADVISORY","url":"https://www.tenable.com/security/tns-2016-16"},{"type":"ADVISORY","url":"https://www.tenable.com/security/tns-2016-20"},{"type":"ADVISORY","url":"https://www.tenable.com/security/tns-2016-21"},{"type":"ADVISORY","url":"https://www.tenable.com/security/tns-2017-09"},{"type":"ADVISORY","url":"https://www.teskalabs.com/blog/teskalabs-bulletin-160826-seacat-sweet32-issue"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1369383"},{"type":"FIX","url":"http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html"},{"type":"FIX","url":"http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html"},{"type":"FIX","url":"http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html"},{"type":"FIX","url":"http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html"},{"type":"FIX","url":"http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html"},{"type":"FIX","url":"https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html"},{"type":"ARTICLE","url":"http://lists.opensuse.org/opensuse-security-announce/2016-09/msg00022.html"},{"type":"ARTICLE","url":"http://lists.opensuse.org/opensuse-security-announce/2016-09/msg00023.html"},{"type":"ARTICLE","url":"http://lists.opensuse.org/opensuse-security-announce/2016-09/msg00024.html"},{"type":"ARTICLE","url":"http://lists.opensuse.org/opensuse-security-announce/2016-09/msg00031.html"},{"type":"ARTICLE","url":"http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00005.html"},{"type":"ARTICLE","url":"http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00011.html"},{"type":"ARTICLE","url":"http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00012.html"},{"type":"ARTICLE","url":"http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00021.html"},{"type":"ARTICLE","url":"http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00029.html"},{"type":"ARTICLE","url":"http://lists.opensuse.org/opensuse-security-announce/2017-01/msg00068.html"},{"type":"ARTICLE","url":"http://lists.opensuse.org/opensuse-security-announce/2017-02/msg00003.html"},{"type":"ARTICLE","url":"http://lists.opensuse.org/opensuse-security-announce/2017-02/msg00023.html"},{"type":"ARTICLE","url":"http://lists.opensuse.org/opensuse-security-announce/2017-02/msg00028.html"},{"type":"ARTICLE","url":"http://lists.opensuse.org/opensuse-security-announce/2017-02/msg00032.html"},{"type":"ARTICLE","url":"http://lists.opensuse.org/opensuse-security-announce/2017-05/msg00076.html"},{"type":"ARTICLE","url":"http://lists.opensuse.org/opensuse-security-announce/2017-10/msg00010.html"},{"type":"ARTICLE","url":"http://lists.opensuse.org/opensuse-security-announce/2017-10/msg00011.html"},{"type":"ARTICLE","url":"http://lists.opensuse.org/opensuse-security-announce/2018-02/msg00032.html"},{"type":"ARTICLE","url":"http://seclists.org/fulldisclosure/2017/Jul/31"},{"type":"ARTICLE","url":"http://seclists.org/fulldisclosure/2017/May/105"},{"type":"ARTICLE","url":"https://blog.cryptographyengineering.com/2016/08/24/attack-of-week-64-bit-ciphers-in-tls/"},{"type":"ARTICLE","url":"https://nakedsecurity.sophos.com/2016/08/25/anatomy-of-a-cryptographic-collision-the-sweet32-attack/"},{"type":"ARTICLE","url":"https://seclists.org/bugtraq/2018/Nov/21"},{"type":"ARTICLE","url":"https://sweet32.info/"},{"type":"ARTICLE","url":"https://www.ietf.org/mail-archive/web/tls/current/msg04560.html"},{"type":"ARTICLE","url":"https://www.nccgroup.trust/us/about-us/newsroom-and-events/blog/2016/august/new-practical-attacks-on-64-bit-block-ciphers-3des-blowfish/"},{"type":"ARTICLE","url":"https://www.openssl.org/blog/blog/2016/08/24/sweet32/"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/nodejs/node","events":[{"introduced":"163ca274230fce536afe76c64676c332693ad7c1"},{"fixed":"848d650dade802c835b4b3a1e29c7581e79494ed"},{"introduced":"2b18916ff054309a07408719b62e2b6a4f1e056a"},{"fixed":"0ad4bbd94af535d9b70f64fff28652f23b05c403"},{"introduced":"6dc12b1042d5d4727f77e8a1c5758dab91400069"},{"fixed":"57ca7390d03372b99d9cf8563c75a3895d93a6e6"},{"introduced":"ce3e3c5fe15479475c068482c48eb9cbf1ac9df5"},{"fixed":"d87ad0ceea3f8ecf14b15cf95776fdbb277e0f07"},{"introduced":"f9f837885343a2a3f5ba2b8c510eaac395c8c865"},{"fixed":"85df6ada477715020dbd22e2fb5e687d84d663ff"}]}],"versions":["v0.10.0","v0.10.1","v0.10.10","v0.10.11","v0.10.12","v0.10.13","v0.10.14","v0.10.15","v0.10.16","v0.10.17","v0.10.18","v0.10.19","v0.10.2","v0.10.20","v0.10.21","v0.10.22","v0.10.23","v0.10.24","v0.10.25","v0.10.26","v0.10.27","v0.10.28","v0.10.29","v0.10.3","v0.10.30","v0.10.31","v0.10.32","v0.10.33","v0.10.34","v0.10.35","v0.10.36","v0.10.37","v0.10.38","v0.10.39","v0.10.4","v0.10.40","v0.10.41","v0.10.42","v0.10.43","v0.10.44","v0.10.45","v0.10.46","v0.10.5","v0.10.6","v0.10.7","v0.10.8","v0.10.9","v0.11.0","v0.11.1","v0.11.10","v0.11.11","v0.11.12","v0.11.13","v0.11.15","v0.11.16","v0.11.2","v0.11.3","v0.11.4","v0.11.5","v0.11.6","v0.11.7","v0.11.8","v0.11.9","v0.12.0","v0.12.1","v0.12.10","v0.12.11","v0.12.12","v0.12.13","v0.12.14","v0.12.15","v0.12.2","v0.12.3","v0.12.4","v0.12.5","v0.12.6","v0.12.7","v0.12.8","v0.12.9","v1.0.0","v1.0.0-release","v1.0.1","v1.0.1-release","v1.0.2","v1.0.2-release","v1.0.3","v1.0.4","v1.1.0","v1.2.0","v1.3.0","v1.4.1","v1.4.2","v1.4.3","v1.5.0","v1.5.1","v1.6.0","v1.6.1","v1.6.2","v1.6.3","v1.6.4","v1.7.0","v1.7.1","v1.8.1","v2.0.0","v2.0.1","v2.0.2","v2.1.0","v2.2.0","v2.2.1","v2.3.0","v2.3.1","v2.3.2","v2.3.3","v2.3.4","v2.4.0","v2.5.0","v3.0.0","v4.0.0","v4.1.0","v4.1.1","v4.1.2","v4.2.0","v4.2.1","v4.2.2","v4.2.3","v4.2.4","v4.2.5","v4.2.6","v4.3.0","v4.3.1","v4.3.2","v4.4.0","v4.4.1","v4.4.2","v4.4.3","v4.4.4","v4.4.5","v4.4.6","v4.4.7","v4.5.0","v6.0.0","v6.1.0","v6.2.0","v6.2.1","v6.2.2","v6.3.0","v6.3.1","v6.4.0","v6.5.0","v6.6.0"],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2016-2183.json"}},{"ranges":[{"type":"GIT","repo":"https://github.com/openssl/openssl","events":[{"introduced":"636dfadc70ce26f2473870570bfd9ec352806b1d"},{"fixed":"c4da9ac23de497ce039a102e6715381047899447"}]}],"versions":["openssl-3.5.0","openssl-3.5.1","openssl-3.5.2"],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2016-2183.json"}},{"ranges":[{"type":"GIT","repo":"https://github.com/python/cpython","events":[{"introduced":"0"},{"fixed":"9c1426de7521299f70eb5483e7e25d1c2a73dbbd"},{"introduced":"2e789a1f1d84b343a996e8654590703b5fbdd441"},{"fixed":"51ba5b7d0c194b0c2b1e5d647e70e3538b8dde3e"},{"introduced":"3101b7076270756f8be699358c69c5d15ea2cc48"},{"fixed":"7dc38385ce78c5c04637531c4325a83b57fbeb3a"}]}],"versions":["3.2","v3.4.4","v3.4.4rc1","v3.4.5","v3.4.5rc1","v3.5.0","v3.5.1","v3.5.1rc1","v3.5.2","v3.5.2rc1","v3.5.3rc1","v3.6.0a1"],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2016-2183.json"}}],"schema_version":"1.7.3","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"}]}