{"id":"CVE-2016-8610","details":"A denial of service flaw was found in OpenSSL 0.9.8, 1.0.1, 1.0.2 through 1.0.2h, and 1.1.0 in the way the TLS/SSL protocol defined processing of ALERT packets during a connection handshake. A remote attacker could use this flaw to make a TLS/SSL server consume an excessive amount of CPU and fail to accept connections from other clients.","modified":"2026-04-16T01:38:18.601530850Z","published":"2017-11-13T22:29:00.203Z","related":["SUSE-SU-2017:0304-1","SUSE-SU-2017:0348-1","SUSE-SU-2017:0461-1","SUSE-SU-2017:0495-1","SUSE-SU-2017:0585-1","SUSE-SU-2017:0601-1","SUSE-SU-2017:0605-1","SUSE-SU-2017:2700-1","SUSE-SU-2018:0112-1","SUSE-SU-2018:3864-1","SUSE-SU-2018:3864-2","SUSE-SU-2018:3964-1","SUSE-SU-2018:3994-1","SUSE-SU-2018:4068-1","SUSE-SU-2018:4274-1","SUSE-SU-2019:1553-1","openSUSE-SU-2024:10801-1"],"database_specific":{"unresolved_ranges":[{"extracted_events":[{"introduced":"11.0"},{"last_affected":"11.40"}],"cpe":"cpe:2.3:a:netapp:e-series_santricity_os_controller:*:*:*:*:*:*:*:*","source":"CPE_FIELD"},{"extracted_events":[{"last_affected":"11.1.2.3.0"}],"cpe":"cpe:2.3:a:oracle:adaptive_access_manager:11.1.2.3.0:*:*:*:*:*:*:*","source":"CPE_FIELD"},{"extracted_events":[{"last_affected":"13.3.0.1"}],"cpe":"cpe:2.3:a:oracle:application_testing_suite:13.3.0.1:*:*:*:*:*:*:*","source":"CPE_FIELD"},{"extracted_events":[{"last_affected":"12.1.1"}],"cpe":"cpe:2.3:a:oracle:communications_analytics:12.1.1:*:*:*:*:*:*:*","source":"CPE_FIELD"},{"extracted_events":[{"last_affected":"7.3.4"}],"cpe":"cpe:2.3:a:oracle:communications_ip_service_activator:7.3.4:*:*:*:*:*:*:*","source":"CPE_FIELD"},{"extracted_events":[{"last_affected":"7.4.0"}],"cpe":"cpe:2.3:a:oracle:communications_ip_service_activator:7.4.0:*:*:*:*:*:*:*","source":"CPE_FIELD"},{"extracted_events":[{"last_affected":"11.2.0.4"}],"cpe":"cpe:2.3:a:oracle:core_rdbms:11.2.0.4:*:*:*:*:*:*:*","source":"CPE_FIELD"},{"extracted_events":[{"last_affected":"12.1.0.2"}],"cpe":"cpe:2.3:a:oracle:core_rdbms:12.1.0.2:*:*:*:*:*:*:*","source":"CPE_FIELD"},{"extracted_events":[{"last_affected":"12.2.0.1"}],"cpe":"cpe:2.3:a:oracle:core_rdbms:12.2.0.1:*:*:*:*:*:*:*","source":"CPE_FIELD"},{"extracted_events":[{"last_affected":"18c"}],"cpe":"cpe:2.3:a:oracle:core_rdbms:18c:*:*:*:*:*:*:*","source":"CPE_FIELD"},{"extracted_events":[{"last_affected":"19c"}],"cpe":"cpe:2.3:a:oracle:core_rdbms:19c:*:*:*:*:*:*:*","source":"CPE_FIELD"},{"extracted_events":[{"last_affected":"12.3.3"}],"cpe":"cpe:2.3:a:oracle:enterprise_manager_ops_center:12.3.3:*:*:*:*:*:*:*","source":"CPE_FIELD"},{"extracted_events":[{"last_affected":"12.4.0"}],"cpe":"cpe:2.3:a:oracle:enterprise_manager_ops_center:12.4.0:*:*:*:*:*:*:*","source":"CPE_FIELD"},{"extracted_events":[{"last_affected":"12.3.2.1.0"}],"cpe":"cpe:2.3:a:oracle:goldengate_application_adapters:12.3.2.1.0:*:*:*:*:*:*:*","source":"CPE_FIELD"},{"extracted_events":[{"last_affected":"9.2"}],"cpe":"cpe:2.3:a:oracle:jd_edwards_enterpriseone_tools:9.2:*:*:*:*:*:*:*","source":"CPE_FIELD"},{"extracted_events":[{"last_affected":"8.56"}],"cpe":"cpe:2.3:a:oracle:peoplesoft_enterprise_peopletools:8.56:*:*:*:*:*:*:*","source":"CPE_FIELD"},{"extracted_events":[{"last_affected":"8.57"}],"cpe":"cpe:2.3:a:oracle:peoplesoft_enterprise_peopletools:8.57:*:*:*:*:*:*:*","source":"CPE_FIELD"},{"extracted_events":[{"last_affected":"8.58"}],"cpe":"cpe:2.3:a:oracle:peoplesoft_enterprise_peopletools:8.58:*:*:*:*:*:*:*","source":"CPE_FIELD"},{"extracted_events":[{"last_affected":"15.0.3"}],"cpe":"cpe:2.3:a:oracle:retail_predictive_application_server:15.0.3:*:*:*:*:*:*:*","source":"CPE_FIELD"},{"extracted_events":[{"last_affected":"16.0.3"}],"cpe":"cpe:2.3:a:oracle:retail_predictive_application_server:16.0.3:*:*:*:*:*:*:*","source":"CPE_FIELD"},{"extracted_events":[{"fixed":"18.1.4.1.0"}],"cpe":"cpe:2.3:a:oracle:timesten_in-memory_database:*:*:*:*:*:*:*:*","source":"CPE_FIELD"},{"extracted_events":[{"last_affected":"10.3.6.0.0"}],"cpe":"cpe:2.3:a:oracle:weblogic_server:10.3.6.0.0:*:*:*:*:*:*:*","source":"CPE_FIELD"},{"extracted_events":[{"last_affected":"12.1.3.0.0"}],"cpe":"cpe:2.3:a:oracle:weblogic_server:12.1.3.0.0:*:*:*:*:*:*:*","source":"CPE_FIELD"},{"extracted_events":[{"last_affected":"12.2.1.3.0"}],"cpe":"cpe:2.3:a:oracle:weblogic_server:12.2.1.3.0:*:*:*:*:*:*:*","source":"CPE_FIELD"},{"extracted_events":[{"last_affected":"12.2.1.4.0"}],"cpe":"cpe:2.3:a:oracle:weblogic_server:12.2.1.4.0:*:*:*:*:*:*:*","source":"CPE_FIELD"},{"extracted_events":[{"last_affected":"6.0.0"}],"cpe":"cpe:2.3:a:redhat:jboss_enterprise_application_platform:6.0.0:*:*:*:*:*:*:*","source":"CPE_FIELD"},{"extracted_events":[{"last_affected":"6.4.0"}],"cpe":"cpe:2.3:a:redhat:jboss_enterprise_application_platform:6.4.0:*:*:*:*:*:*:*","source":"CPE_FIELD"},{"extracted_events":[{"last_affected":"8.0"}],"cpe":"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","source":"CPE_FIELD"},{"extracted_events":[{"fixed":"xcp2361"},{"introduced":"xcp3000"},{"fixed":"xcp3070"}],"cpe":"cpe:2.3:o:fujitsu:m10-1_firmware:*:*:*:*:*:*:*:*","source":"CPE_FIELD"},{"extracted_events":[{"fixed":"xcp2361"},{"introduced":"xcp3000"},{"fixed":"xcp3070"}],"cpe":"cpe:2.3:o:fujitsu:m10-4_firmware:*:*:*:*:*:*:*:*","source":"CPE_FIELD"},{"extracted_events":[{"fixed":"xcp2361"},{"introduced":"xcp3000"},{"fixed":"xcp3070"}],"cpe":"cpe:2.3:o:fujitsu:m10-4s_firmware:*:*:*:*:*:*:*:*","source":"CPE_FIELD"},{"extracted_events":[{"fixed":"xcp2361"},{"introduced":"xcp3000"},{"fixed":"xcp3070"}],"cpe":"cpe:2.3:o:fujitsu:m12-1_firmware:*:*:*:*:*:*:*:*","source":"CPE_FIELD"},{"extracted_events":[{"fixed":"xcp2361"},{"introduced":"xcp3000"},{"fixed":"xcp3070"}],"cpe":"cpe:2.3:o:fujitsu:m12-2_firmware:*:*:*:*:*:*:*:*","source":"CPE_FIELD"},{"extracted_events":[{"fixed":"xcp2361"},{"introduced":"xcp3000"},{"fixed":"xcp3070"}],"cpe":"cpe:2.3:o:fujitsu:m12-2s_firmware:*:*:*:*:*:*:*:*","source":"CPE_FIELD"},{"extracted_events":[{"last_affected":"6.1.17"},{"introduced":"7.0.0"},{"last_affected":"7.0.15"},{"introduced":"7.1.0"},{"last_affected":"7.1.10"}],"cpe":"cpe:2.3:o:paloaltonetworks:pan-os:*:*:*:*:*:*:*:*","source":"CPE_FIELD"},{"extracted_events":[{"last_affected":"6.0"}],"cpe":"cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*","source":"CPE_FIELD"},{"extracted_events":[{"last_affected":"7.0"}],"cpe":"cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*","source":"CPE_FIELD"},{"extracted_events":[{"last_affected":"6.0"}],"cpe":"cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*","source":"CPE_FIELD"},{"extracted_events":[{"last_affected":"7.0"}],"cpe":"cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*","source":"CPE_FIELD"},{"extracted_events":[{"last_affected":"7.3"}],"cpe":"cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*","source":"CPE_FIELD"},{"extracted_events":[{"last_affected":"7.4"}],"cpe":"cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*","source":"CPE_FIELD"},{"extracted_events":[{"last_affected":"7.6"}],"cpe":"cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*","source":"CPE_FIELD"},{"extracted_events":[{"last_affected":"7.3"}],"cpe":"cpe:2.3:o:redhat:enterprise_linux_server_eus:7.3:*:*:*:*:*:*:*","source":"CPE_FIELD"},{"extracted_events":[{"last_affected":"7.4"}],"cpe":"cpe:2.3:o:redhat:enterprise_linux_server_eus:7.4:*:*:*:*:*:*:*","source":"CPE_FIELD"},{"extracted_events":[{"last_affected":"7.5"}],"cpe":"cpe:2.3:o:redhat:enterprise_linux_server_eus:7.5:*:*:*:*:*:*:*","source":"CPE_FIELD"},{"extracted_events":[{"last_affected":"7.6"}],"cpe":"cpe:2.3:o:redhat:enterprise_linux_server_eus:7.6:*:*:*:*:*:*:*","source":"CPE_FIELD"},{"extracted_events":[{"last_affected":"7.3"}],"cpe":"cpe:2.3:o:redhat:enterprise_linux_server_tus:7.3:*:*:*:*:*:*:*","source":"CPE_FIELD"},{"extracted_events":[{"last_affected":"7.6"}],"cpe":"cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*","source":"CPE_FIELD"},{"extracted_events":[{"last_affected":"6.0"}],"cpe":"cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*","source":"CPE_FIELD"},{"extracted_events":[{"last_affected":"7.0"}],"cpe":"cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*","source":"CPE_FIELD"}]},"references":[{"type":"WEB","url":"https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commit%3Bh=af58be768ebb690f78530f796e92b8ae5c9a4401"},{"type":"ADVISORY","url":"http://rhn.redhat.com/errata/RHSA-2017-0286.html"},{"type":"ADVISORY","url":"http://rhn.redhat.com/errata/RHSA-2017-0574.html"},{"type":"ADVISORY","url":"http://rhn.redhat.com/errata/RHSA-2017-1415.html"},{"type":"ADVISORY","url":"http://rhn.redhat.com/errata/RHSA-2017-1659.html"},{"type":"ADVISORY","url":"http://seclists.org/oss-sec/2016/q4/224"},{"type":"ADVISORY","url":"http://www.securityfocus.com/bid/93841"},{"type":"ADVISORY","url":"http://www.securitytracker.com/id/1037084"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2017:1413"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2017:1414"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2017:1658"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2017:1801"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2017:1802"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2017:2493"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2017:2494"},{"type":"ADVISORY","url":"https://security.360.cn/cve/CVE-2016-8610/"},{"type":"ADVISORY","url":"https://security.FreeBSD.org/advisories/FreeBSD-SA-16:35.openssl.asc"},{"type":"ADVISORY","url":"https://security.netapp.com/advisory/ntap-20171130-0001/"},{"type":"ADVISORY","url":"https://security.paloaltonetworks.com/CVE-2016-8610"},{"type":"ADVISORY","url":"https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03897en_us"},{"type":"ADVISORY","url":"https://www.debian.org/security/2017/dsa-3773"},{"type":"FIX","url":"https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-8610"},{"type":"FIX","url":"https://www.oracle.com/security-alerts/cpuapr2020.html"},{"type":"FIX","url":"https://www.oracle.com/security-alerts/cpujan2020.html"},{"type":"FIX","url":"https://www.oracle.com/security-alerts/cpujul2020.html"},{"type":"FIX","url":"https://www.oracle.com/security-alerts/cpuoct2020.html"},{"type":"FIX","url":"https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html"},{"type":"FIX","url":"https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/openssl/openssl","events":[{"introduced":"e818b74be2170fbe957a07b0da4401c2b694b3b8"},{"last_affected":"e818b74be2170fbe957a07b0da4401c2b694b3b8"},{"introduced":"0"},{"last_affected":"c2ef67100cd0ca2321b5f1a437abb93fc7e11e37"},{"last_affected":"888759a1d38197f29de7227876c3b58fbff8549f"},{"last_affected":"7ea5bd2b52d0e81eaef3d109b3b12545306f201c"}],"database_specific":{"extracted_events":[{"introduced":"1.0.2"},{"last_affected":"1.0.2h"},{"introduced":"0"},{"last_affected":"0.9.8"},{"last_affected":"1.0.1"},{"last_affected":"1.1.0"}],"cpe":["cpe:2.3:a:openssl:openssl:*:*:*:*:*:*:*:*","cpe:2.3:a:openssl:openssl:0.9.8:*:*:*:*:*:*:*","cpe:2.3:a:openssl:openssl:1.0.1:*:*:*:*:*:*:*","cpe:2.3:a:openssl:openssl:1.1.0:*:*:*:*:*:*:*"],"source":"CPE_FIELD"}}],"versions":["BEFORE_engine","OpenSSL_0_9_1c","OpenSSL_0_9_2b","OpenSSL_0_9_3","OpenSSL_0_9_3a","OpenSSL_0_9_3beta2","OpenSSL_0_9_4","OpenSSL_0_9_5a","OpenSSL_0_9_5a-beta1","OpenSSL_0_9_5a-beta2","OpenSSL_0_9_5beta1","OpenSSL_0_9_5beta2","OpenSSL_0_9_6-beta3","OpenSSL_0_9_8","OpenSSL_0_9_8-beta1","OpenSSL_0_9_8-beta2","OpenSSL_0_9_8-beta4","OpenSSL_0_9_8-beta5","OpenSSL_0_9_8-beta6","OpenSSL_0_9_8-post-auto-reformat","OpenSSL_0_9_8-post-reformat","OpenSSL_0_9_8-pre-auto-reformat","OpenSSL_0_9_8-pre-reformat","OpenSSL_0_9_8a","OpenSSL_0_9_8b","OpenSSL_0_9_8c","OpenSSL_0_9_8d","OpenSSL_0_9_8e","OpenSSL_0_9_8h","OpenSSL_0_9_8i","OpenSSL_0_9_8j","OpenSSL_0_9_8m","OpenSSL_0_9_8m-beta1","OpenSSL_0_9_8n","OpenSSL_0_9_8o","OpenSSL_0_9_8p","OpenSSL_0_9_8q","OpenSSL_0_9_8r","OpenSSL_0_9_8s","OpenSSL_0_9_8t","OpenSSL_0_9_8u","OpenSSL_0_9_8v","OpenSSL_0_9_8w","OpenSSL_0_9_8x","OpenSSL_0_9_8y","OpenSSL_0_9_8za","OpenSSL_0_9_8zb","OpenSSL_0_9_8zc","OpenSSL_0_9_8zd","OpenSSL_0_9_8ze","OpenSSL_0_9_8zf","OpenSSL_0_9_8zg","OpenSSL_0_9_8zh","OpenSSL_1_0_1","OpenSSL_1_0_1-beta1","OpenSSL_1_0_1-beta2","OpenSSL_1_0_1-beta3","OpenSSL_1_0_1-post-auto-reformat","OpenSSL_1_0_1-post-reformat","OpenSSL_1_0_1-pre-auto-reformat","OpenSSL_1_0_1-pre-reformat","OpenSSL_1_0_1a","OpenSSL_1_0_1b","OpenSSL_1_0_1c","OpenSSL_1_0_1d","OpenSSL_1_0_1e","OpenSSL_1_0_1f","OpenSSL_1_0_1g","OpenSSL_1_0_1h","OpenSSL_1_0_1i","OpenSSL_1_0_1j","OpenSSL_1_0_1k","OpenSSL_1_0_1l","OpenSSL_1_0_1m","OpenSSL_1_0_1n","OpenSSL_1_0_1o","OpenSSL_1_0_1p","OpenSSL_1_0_1q","OpenSSL_1_0_1r","OpenSSL_1_0_1s","OpenSSL_1_0_1t","OpenSSL_1_0_1u","OpenSSL_1_0_2u","OpenSSL_1_1_0","OpenSSL_1_1_0-pre1","OpenSSL_1_1_0-pre2","OpenSSL_1_1_0-pre3","OpenSSL_1_1_0-pre4","OpenSSL_1_1_0-pre5","OpenSSL_1_1_0-pre6","OpenSSL_1_1_0a","OpenSSL_1_1_0b","OpenSSL_1_1_0c","OpenSSL_1_1_0d","OpenSSL_1_1_0e","OpenSSL_1_1_0f","OpenSSL_1_1_0g","OpenSSL_1_1_0h","OpenSSL_1_1_0i","OpenSSL_1_1_0j","OpenSSL_1_1_0k","OpenSSL_1_1_0l","master-post-auto-reformat","master-post-reformat","master-pre-auto-reformat","master-pre-reformat"],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2016-8610.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}]}