National Vulnerability Database

National Vulnerability Database

National Vulnerability
Database

Vulnerability Change Record for CVE-2016-6303

Change History

Modified Analysis - 2/23/2017 12:40:24 PM

Action Type Old Value New Value
Added Reference
https://www.openssl.org/news/secadv/20160922.txt [Vendor Advisory]
Changed Reference Type
http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10759 No Types Assigned
http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10759 Third Party Advisory
Changed Reference Type
http://www-01.ibm.com/support/docview.wss?uid=swg21995039 No Types Assigned
http://www-01.ibm.com/support/docview.wss?uid=swg21995039 Third Party Advisory
Changed Reference Type
http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html No Types Assigned
http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html Third Party Advisory
Changed Reference Type
http://www.securityfocus.com/bid/92984 No Types Assigned
http://www.securityfocus.com/bid/92984 Third Party Advisory, VDB Entry
Changed Reference Type
https://bto.bluecoat.com/security-advisory/sa132 No Types Assigned
https://bto.bluecoat.com/security-advisory/sa132 Third Party Advisory
Changed Reference Type
https://bugzilla.redhat.com/show_bug.cgi?id=1370146 Issue Tracking
https://bugzilla.redhat.com/show_bug.cgi?id=1370146 Issue Tracking, Patch
Changed Reference Type
https://git.openssl.org/?p=openssl.git;a=commit;h=55d83bf7c10c7b205fffa23fa7c3977491e56c07 Issue Tracking, Patch
https://git.openssl.org/?p=openssl.git;a=commit;h=55d83bf7c10c7b205fffa23fa7c3977491e56c07 Third Party Advisory, Issue Tracking, Patch
Changed Reference Type
https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA40312 No Types Assigned
https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA40312 Third Party Advisory
Changed Reference Type
https://www.tenable.com/security/tns-2016-16 No Types Assigned
https://www.tenable.com/security/tns-2016-16 Third Party Advisory
Changed CPE Configuration
OR
     *cpe:2.3:a:openssl:openssl:1.0.2h:*:*:*:*:*:*:* (and previous)
OR
     *cpe:2.3:a:openssl:openssl:1.0.1:*:*:*:*:*:*:*
     *cpe:2.3:a:openssl:openssl:1.0.1a:*:*:*:*:*:*:*
     *cpe:2.3:a:openssl:openssl:1.0.1b:*:*:*:*:*:*:*
     *cpe:2.3:a:openssl:openssl:1.0.1c:*:*:*:*:*:*:*
     *cpe:2.3:a:openssl:openssl:1.0.1d:*:*:*:*:*:*:*
     *cpe:2.3:a:openssl:openssl:1.0.1e:*:*:*:*:*:*:*
     *cpe:2.3:a:openssl:openssl:1.0.1f:*:*:*:*:*:*:*
     *cpe:2.3:a:openssl:openssl:1.0.1g:*:*:*:*:*:*:*
     *cpe:2.3:a:openssl:openssl:1.0.1h:*:*:*:*:*:*:*
     *cpe:2.3:a:openssl:openssl:1.0.1i:*:*:*:*:*:*:*
     *cpe:2.3:a:openssl:openssl:1.0.1j:*:*:*:*:*:*:*
     *cpe:2.3:a:openssl:openssl:1.0.1k:*:*:*:*:*:*:*
     *cpe:2.3:a:openssl:openssl:1.0.1l:*:*:*:*:*:*:*
     *cpe:2.3:a:openssl:openssl:1.0.1m:*:*:*:*:*:*:*
     *cpe:2.3:a:openssl:openssl:1.0.1n:*:*:*:*:*:*:*
     *cpe:2.3:a:openssl:openssl:1.0.1o:*:*:*:*:*:*:*
     *cpe:2.3:a:openssl:openssl:1.0.1p:*:*:*:*:*:*:*
     *cpe:2.3:a:openssl:openssl:1.0.1q:*:*:*:*:*:*:*
     *cpe:2.3:a:openssl:openssl:1.0.1r:*:*:*:*:*:*:*
     *cpe:2.3:a:openssl:openssl:1.0.1s:*:*:*:*:*:*:*
     *cpe:2.3:a:openssl:openssl:1.0.1t:*:*:*:*:*:*:*
     *cpe:2.3:a:openssl:openssl:1.0.2:*:*:*:*:*:*:*
     *cpe:2.3:a:openssl:openssl:1.0.2a:*:*:*:*:*:*:*
     *cpe:2.3:a:openssl:openssl:1.0.2b:*:*:*:*:*:*:*
     *cpe:2.3:a:openssl:openssl:1.0.2c:*:*:*:*:*:*:*
     *cpe:2.3:a:openssl:openssl:1.0.2d:*:*:*:*:*:*:*
     *cpe:2.3:a:openssl:openssl:1.0.2e:*:*:*:*:*:*:*
     *cpe:2.3:a:openssl:openssl:1.0.2f:*:*:*:*:*:*:*
     *cpe:2.3:a:openssl:openssl:1.0.2g:*:*:*:*:*:*:*
     *cpe:2.3:a:openssl:openssl:1.0.2h:*:*:*:*:*:*:*