U.S. flag   An official website of the United States government
Dot gov

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Https

Secure .gov websites use HTTPS
A lock (Dot gov) or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.

Vulnerability Change Records for CVE-2016-2183

Change History

Modified Analysis by NIST 9/01/2016 2:32:29 PM

Action Type Old Value New Value
Added CPE Configuration

								
							
							
						
Configuration 1
     OR
          *cpe:2.3:a:openssl:openssl:1.0.2:*:*:*:*:*:*:*
          *cpe:2.3:a:openssl:openssl:1.1.0:*:*:*:*:*:*:*
          *cpe:2.3:a:openssl:openssl:1.0.1:*:*:*:*:*:*:*
Configuration 2
     OR
          *cpe:2.3:a:cisco:content_security_management_appliance:9.7.0-006:*:*:*:*:*:*:*
          *cpe:2.3:a:cisco:content_security_management_appliance:9.6.6-068:*:*:*:*:*:*:*
Configuration 3
     OR
          *cpe:2.3:a:python:python:3.5:*:*:*:*:*:*:*
          *cpe:2.3:a:python:python:3.6:*:*:*:*:*:*:*
          *cpe:2.3:a:python:python:3.4.0:*:*:*:*:*:*:*
          *cpe:2.3:a:python:python:3.3:*:*:*:*:*:*:*
          *cpe:2.3:a:python:python:2.7:*:*:*:*:*:*:*
Configuration 4
     OR
          *cpe:2.3:a:redhat:jboss_web_server:3.0:*:*:*:*:*:*:*
          *cpe:2.3:a:redhat:jboss_enterprise_web_server:2.0.0:*:*:*:*:*:*:*
          *cpe:2.3:a:redhat:jboss_enterprise_application_platform:6.0.0:*:*:*:*:*:*:*
          *cpe:2.3:a:redhat:jboss_enterprise_web_server:1.0.0:*:*:*:*:*:*:*
          *cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*
          *cpe:2.3:o:redhat:enterprise_linux:5.0:*:*:*:*:*:*:*
          *cpe:2.3:o:redhat:enterprise_linux:6:*:*:*:*:*:*:*
Added CVSS V2

								
							
							
						
(AV:N/AC:L/Au:N/C:P/I:N/A:N)
Added CVSS V3

								
							
							
						
AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
Added CWE

								
							
							
						
CWE-200
Added Reference

								
							
							
						
http://www.securityfocus.com/bid/92630/references
Added Reference

								
							
							
						
https://bugs.python.org/issue27850
Added Reference

								
							
							
						
https://bugzilla.suse.com/show_bug.cgi?id=995359
Added Reference

								
							
							
						
https://community.qualys.com/thread/16555
Added Reference

								
							
							
						
https://quickview.cloudapps.cisco.com/quickview/bug/CSCvb05575
Added Reference

								
							
							
						
https://security-tracker.debian.org/tracker/CVE-2016-2183
Added Reference

								
							
							
						
https://twitter.com/symantec/status/768786631159603200
Added Reference

								
							
							
						
https://www.suse.com/security/cve/CVE-2016-2183.html
Changed Reference Type
https://access.redhat.com/articles/2548661 No Types Assigned
https://access.redhat.com/articles/2548661 Mitigation, Third Party Advisory
Changed Reference Type
https://access.redhat.com/security/cve/cve-2016-2183 No Types Assigned
https://access.redhat.com/security/cve/cve-2016-2183 Third Party Advisory
Changed Reference Type
https://blog.cryptographyengineering.com/2016/08/24/attack-of-week-64-bit-ciphers-in-tls/ No Types Assigned
https://blog.cryptographyengineering.com/2016/08/24/attack-of-week-64-bit-ciphers-in-tls/ Third Party Advisory, Technical Description, Press/Media Coverage
Changed Reference Type
https://bugzilla.redhat.com/show_bug.cgi?id=1369383 No Types Assigned
https://bugzilla.redhat.com/show_bug.cgi?id=1369383 Third Party Advisory, Issue Tracking
Changed Reference Type
https://github.com/ssllabs/ssllabs-scan/issues/387#issuecomment-242514633 No Types Assigned
https://github.com/ssllabs/ssllabs-scan/issues/387#issuecomment-242514633 Third Party Advisory
Changed Reference Type
https://nakedsecurity.sophos.com/2016/08/25/anatomy-of-a-cryptographic-collision-the-sweet32-attack/ No Types Assigned
https://nakedsecurity.sophos.com/2016/08/25/anatomy-of-a-cryptographic-collision-the-sweet32-attack/ Third Party Advisory, Technical Description, Press/Media Coverage
Changed Reference Type
https://sweet32.info/ No Types Assigned
https://sweet32.info/ Third Party Advisory, Technical Description
Changed Reference Type
https://www.ietf.org/mail-archive/web/tls/current/msg04560.html No Types Assigned
https://www.ietf.org/mail-archive/web/tls/current/msg04560.html Third Party Advisory, Mailing List
Changed Reference Type
https://www.nccgroup.trust/us/about-us/newsroom-and-events/blog/2016/august/new-practical-attacks-on-64-bit-block-ciphers-3des-blowfish/ No Types Assigned
https://www.nccgroup.trust/us/about-us/newsroom-and-events/blog/2016/august/new-practical-attacks-on-64-bit-block-ciphers-3des-blowfish/ Third Party Advisory, Technical Description, Press/Media Coverage
Changed Reference Type
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ No Types Assigned
https://www.openssl.org/blog/blog/2016/08/24/sweet32/ Mitigation, Third Party Advisory, Press/Media Coverage
Changed Reference Type
https://www.sigsac.org/ccs/CCS2016/accepted-papers/ No Types Assigned
https://www.sigsac.org/ccs/CCS2016/accepted-papers/ Third Party Advisory
Changed Reference Type
https://www.teskalabs.com/blog/teskalabs-bulletin-160826-seacat-sweet32-issue No Types Assigned
https://www.teskalabs.com/blog/teskalabs-bulletin-160826-seacat-sweet32-issue Third Party Advisory