U.S. flag   An official website of the United States government
Dot gov

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Https

Secure .gov websites use HTTPS
A lock (Dot gov) or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.

Vulnerability Change Records for CVE-2016-2177

Change History

Modified Analysis by NIST 2/23/2017 2:43:17 PM

Action Type Old Value New Value
Changed CPE Configuration
OR
     *cpe:2.3:a:openssl:openssl:1.0.2h:*:*:*:*:*:*:* (and previous)
OR
     *cpe:2.3:a:openssl:openssl:1.0.1:*:*:*:*:*:*:*
     *cpe:2.3:a:openssl:openssl:1.0.1a:*:*:*:*:*:*:*
     *cpe:2.3:a:openssl:openssl:1.0.1b:*:*:*:*:*:*:*
     *cpe:2.3:a:openssl:openssl:1.0.1c:*:*:*:*:*:*:*
     *cpe:2.3:a:openssl:openssl:1.0.1d:*:*:*:*:*:*:*
     *cpe:2.3:a:openssl:openssl:1.0.1e:*:*:*:*:*:*:*
     *cpe:2.3:a:openssl:openssl:1.0.1f:*:*:*:*:*:*:*
     *cpe:2.3:a:openssl:openssl:1.0.1g:*:*:*:*:*:*:*
     *cpe:2.3:a:openssl:openssl:1.0.1h:*:*:*:*:*:*:*
     *cpe:2.3:a:openssl:openssl:1.0.1i:*:*:*:*:*:*:*
     *cpe:2.3:a:openssl:openssl:1.0.1j:*:*:*:*:*:*:*
     *cpe:2.3:a:openssl:openssl:1.0.1k:*:*:*:*:*:*:*
     *cpe:2.3:a:openssl:openssl:1.0.1l:*:*:*:*:*:*:*
     *cpe:2.3:a:openssl:openssl:1.0.1m:*:*:*:*:*:*:*
     *cpe:2.3:a:openssl:openssl:1.0.1n:*:*:*:*:*:*:*
     *cpe:2.3:a:openssl:openssl:1.0.1o:*:*:*:*:*:*:*
     *cpe:2.3:a:openssl:openssl:1.0.1p:*:*:*:*:*:*:*
     *cpe:2.3:a:openssl:openssl:1.0.1q:*:*:*:*:*:*:*
     *cpe:2.3:a:openssl:openssl:1.0.1r:*:*:*:*:*:*:*
     *cpe:2.3:a:openssl:openssl:1.0.1s:*:*:*:*:*:*:*
     *cpe:2.3:a:openssl:openssl:1.0.1t:*:*:*:*:*:*:*
     *cpe:2.3:a:openssl:openssl:1.0.2:*:*:*:*:*:*:*
     *cpe:2.3:a:openssl:openssl:1.0.2a:*:*:*:*:*:*:*
     *cpe:2.3:a:openssl:openssl:1.0.2b:*:*:*:*:*:*:*
     *cpe:2.3:a:openssl:openssl:1.0.2c:*:*:*:*:*:*:*
     *cpe:2.3:a:openssl:openssl:1.0.2d:*:*:*:*:*:*:*
     *cpe:2.3:a:openssl:openssl:1.0.2e:*:*:*:*:*:*:*
     *cpe:2.3:a:openssl:openssl:1.0.2f:*:*:*:*:*:*:*
     *cpe:2.3:a:openssl:openssl:1.0.2g:*:*:*:*:*:*:*
     *cpe:2.3:a:openssl:openssl:1.0.2h:*:*:*:*:*:*:*
Changed CPE Configuration
OR
     *cpe:2.3:o:oracle:solaris:10:*:*:*:*:*:*:*
     *cpe:2.3:o:oracle:solaris:11.3:*:*:*:*:*:*:*
OR
     *cpe:2.3:o:oracle:linux:5:*:*:*:*:*:*:*
     *cpe:2.3:o:oracle:linux:6.0:*:*:*:*:*:*:*
     *cpe:2.3:o:oracle:linux:7.0:*:*:*:*:*:*:*
     *cpe:2.3:o:oracle:solaris:10:*:*:*:*:*:*:*
     *cpe:2.3:o:oracle:solaris:11.3:*:*:*:*:*:*:*
Changed CVSS V2
(AV:N/AC:M/Au:N/C:N/I:N/A:P)
(AV:N/AC:L/Au:N/C:P/I:P/A:P)
Changed CVSS V3
AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Added CWE

								
							
							
						
CWE-190
Removed CWE
NVD-CWE-Other

								
						
Removed Evaluator Description
<a href="http://cwe.mitre.org/data/definitions/190.html">CWE-190: Integer Overflow or Wraparound</a>

								
						
Added Reference

								
							
							
						
https://www.openssl.org/news/vulnerabilities.html#y2017 [Vendor Advisory]
Changed Reference Type
http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10759 No Types Assigned
http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10759 Third Party Advisory
Changed Reference Type
http://www-01.ibm.com/support/docview.wss?uid=swg21995039 No Types Assigned
http://www-01.ibm.com/support/docview.wss?uid=swg21995039 Third Party Advisory
Changed Reference Type
http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html No Types Assigned
http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html Third Party Advisory
Changed Reference Type
http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2016-3090545.html No Types Assigned
http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2016-3090545.html Third Party Advisory
Changed Reference Type
http://www.oracle.com/technetwork/topics/security/ovmbulletinoct2016-3090547.html No Types Assigned
http://www.oracle.com/technetwork/topics/security/ovmbulletinoct2016-3090547.html Third Party Advisory
Changed Reference Type
http://www.securityfocus.com/bid/91319 No Types Assigned
http://www.securityfocus.com/bid/91319 Third Party Advisory, VDB Entry
Changed Reference Type
http://www.securitytracker.com/id/1036088 No Types Assigned
http://www.securitytracker.com/id/1036088 Third Party Advisory, VDB Entry
Changed Reference Type
http://www.splunk.com/view/SP-CAAAPSV No Types Assigned
http://www.splunk.com/view/SP-CAAAPSV Third Party Advisory
Changed Reference Type
http://www.splunk.com/view/SP-CAAAPUE No Types Assigned
http://www.splunk.com/view/SP-CAAAPUE Third Party Advisory
Changed Reference Type
https://bto.bluecoat.com/security-advisory/sa132 No Types Assigned
https://bto.bluecoat.com/security-advisory/sa132 Third Party Advisory
Changed Reference Type
https://bugzilla.redhat.com/show_bug.cgi?id=1341705 Issue Tracking
https://bugzilla.redhat.com/show_bug.cgi?id=1341705 Issue Tracking, Patch
Changed Reference Type
https://git.openssl.org/?p=openssl.git;a=commit;h=a004e72b95835136d3f1ea90517f706c24c03da7 No Types Assigned
https://git.openssl.org/?p=openssl.git;a=commit;h=a004e72b95835136d3f1ea90517f706c24c03da7 Third Party Advisory, Issue Tracking, Patch
Changed Reference Type
https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA40312 No Types Assigned
https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA40312 Third Party Advisory
Changed Reference Type
https://kc.mcafee.com/corporate/index?page=content&id=SB10165 No Types Assigned
https://kc.mcafee.com/corporate/index?page=content&id=SB10165 Third Party Advisory
Changed Reference Type
https://security.gentoo.org/glsa/201612-16 No Types Assigned
https://security.gentoo.org/glsa/201612-16 Third Party Advisory, VDB Entry, Patch
Changed Reference Type
https://www.tenable.com/security/tns-2016-16 No Types Assigned
https://www.tenable.com/security/tns-2016-16 Third Party Advisory