CVE-2016-6304

Impact:
Important
Public Date:
2016-09-22
IAVA:
2017-A-0020, 2017-A-0047
CWE:
CWE-400
Bugzilla:
1377600: CVE-2016-6304 openssl: OCSP Status Request extension unbounded memory growth
A memory leak flaw was found in the way OpenSSL handled TLS status request extension data during session renegotiation. A remote attacker could cause a TLS server using OpenSSL to consume an excessive amount of memory and, possibly, exit unexpectedly after exhausting all available memory, if it enabled OCSP stapling support.

Find out more about CVE-2016-6304 from the MITRE CVE dictionary dictionary and NIST NVD.

Statement

TLS server applications using OpenSSL versions in Red Hat Enterprise Linux 6 and 7 are only affected if they enable OCSP stapling support. Applications not enabling OCSP stapling support are not affected. Few applications implement OCSP stapling support and typically do not enable it by default.

CVSS v2 metrics

Base Score 5
Base Metrics AV:N/AC:L/Au:N/C:N/I:N/A:P
Access Vector Network
Access Complexity Low
Authentication None
Confidentiality Impact None
Integrity Impact None
Availability Impact Partial

CVSS v3 metrics

CVSS3 Base Score 7.5
CVSS3 Base Metrics CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Attack Vector Network
Attack Complexity Low
Privileges Required None
User Interaction None
Scope Unchanged
Confidentiality None
Integrity Impact None
Availability Impact High

Find out more about Red Hat support for the Common Vulnerability Scoring System (CVSS).

Red Hat Security Errata

Platform Errata Release Date
Red Hat JBoss Enterprise Application Platform 6.4 RHSA-2017:1659 2017-06-28
Red Hat JBoss Enterprise Application Platform 6 for RHEL 6 Server (jbcs-httpd24-openssl) RHSA-2017:1658 2017-06-28
Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server RHSA-2017:2493 2017-08-21
Red Hat JBoss Core Services on RHEL 6 Server RHSA-2017:1414 2017-06-07
Red Hat Enterprise Linux Advanced Update Support 6.5 (openssl) RHSA-2016:2802 2016-11-17
Red Hat Enterprise Linux 6 (openssl) RHSA-2016:1940 2016-09-27
Red Hat JBoss Web Server 3.1 for RHEL 6 RHSA-2017:1801 2017-07-25
Red Hat Enterprise Linux Advanced Update Support 6.6 (openssl) RHSA-2016:2802 2016-11-17
Red Hat Enterprise Linux Advanced Update Support 6.2 (openssl) RHSA-2016:2802 2016-11-17
Red Hat JBoss Enterprise Web Server 2 for RHEL 7 Server RHSA-2017:2493 2017-08-21
Red Hat JBoss Web Server 3.1 RHSA-2017:1802 2017-07-25
Red Hat JBoss Core Services 1 RHSA-2017:1415 2017-06-07
Red Hat Enterprise Linux Server TUS (v. 6.6) (openssl) RHSA-2016:2802 2016-11-17
Red Hat Enterprise Linux Server TUS (v. 6.5) (openssl) RHSA-2016:2802 2016-11-17
Red Hat Enterprise Linux 7 (openssl) RHSA-2016:1940 2016-09-27
Red Hat JBoss Core Services on RHEL 7 Server RHSA-2017:1413 2017-06-07
Red Hat JBoss Web Server 2.1 RHSA-2017:2494 2017-08-21
Red Hat JBoss Web Server 3.1 for RHEL 7 RHSA-2017:1801 2017-07-25
Red Hat JBoss Enterprise Application Platform 6.3 for RHEL 7 Server (jbcs-httpd24-openssl) RHSA-2017:1658 2017-06-28
Red Hat Enterprise Linux Advanced Update Support 6.4 (openssl) RHSA-2016:2802 2016-11-17
Red Hat Enterprise Linux Extended Update Support 6.7 (openssl) RHSA-2016:2802 2016-11-17

Affected Packages State

Platform Package State
Red Hat JBoss Web Server 3.0 openssl Fix deferred
Red Hat JBoss EWS 1 openssl Will not fix
Red Hat JBoss EAP 5 openssl Under investigation
Red Hat Enterprise Linux 7 openssl098e Not affected
Red Hat Enterprise Linux 6 openssl098e Not affected
Red Hat Enterprise Linux 5 openssl Not affected
Red Hat Enterprise Linux 5 openssl097a Not affected
Red Hat Enterprise Linux 4 openssl Not affected

Acknowledgements

Red Hat would like to thank the OpenSSL project for reporting this issue. Upstream acknowledges Shi Lei (Gear Team of Qihoo 360 Inc.) as the original reporter.

External References

Last Modified
Close

Welcome! Check out the Getting Started with Red Hat page for quick tours and guides for common tasks.