CVE Vulnerabilities

CVE-2016-8610

Uncontrolled Resource Consumption

Published: Nov 13, 2017 | Modified: Apr 20, 2025
CVSS 3.x
7.5
HIGH
Source:
NVD
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
CVSS 2.x
5 MEDIUM
AV:N/AC:L/Au:N/C:N/I:N/A:P
RedHat/V2
4.3 MODERATE
AV:N/AC:M/Au:N/C:N/I:N/A:P
RedHat/V3
7.5 MODERATE
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Ubuntu
LOW
root.io logo minimus.io logo echo.ai logo

A denial of service flaw was found in OpenSSL 0.9.8, 1.0.1, 1.0.2 through 1.0.2h, and 1.1.0 in the way the TLS/SSL protocol defined processing of ALERT packets during a connection handshake. A remote attacker could use this flaw to make a TLS/SSL server consume an excessive amount of CPU and fail to accept connections from other clients.

Weakness

The product does not properly control the allocation and maintenance of a limited resource.

Affected Software

NameVendorStart VersionEnd Version
OpensslOpenssl1.0.2 (including)1.0.2h (including)
OpensslOpenssl0.9.8 (including)0.9.8 (including)
OpensslOpenssl1.0.1 (including)1.0.1 (including)
OpensslOpenssl1.1.0 (including)1.1.0 (including)
JBoss Core Services on RHEL 6RedHatjbcs-httpd24-httpd-0:2.4.23-120.jbcs.el6*
JBoss Core Services on RHEL 6RedHatjbcs-httpd24-mod_security-0:2.9.1-19.GA.jbcs.el6*
JBoss Core Services on RHEL 6RedHatjbcs-httpd24-openssl-1:1.0.2h-13.jbcs.el6*
JBoss Core Services on RHEL 7RedHatjbcs-httpd24-httpd-0:2.4.23-120.jbcs.el7*
JBoss Core Services on RHEL 7RedHatjbcs-httpd24-mod_security-0:2.9.1-19.GA.jbcs.el7*
JBoss Core Services on RHEL 7RedHatjbcs-httpd24-openssl-1:1.0.2h-13.jbcs.el7*
Red Hat Enterprise Linux 6RedHatopenssl-0:1.0.1e-48.el6_8.4*
Red Hat Enterprise Linux 6RedHatgnutls-0:2.12.23-21.el6*
Red Hat Enterprise Linux 7RedHatopenssl-1:1.0.1e-60.el7_3.1*
Red Hat JBoss Enterprise Application Platform 6.4RedHatopenssl*
Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 6RedHatjbcs-httpd24-openssl-1:1.0.2h-13.jbcs.el6*
Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 7RedHatjbcs-httpd24-openssl-1:1.0.2h-13.jbcs.el7*
Red Hat JBoss Enterprise Web Server 2 for RHEL 6RedHatjbcs-httpd24-openssl-1:1.0.2h-13.jbcs.el6*
Red Hat JBoss Enterprise Web Server 2 for RHEL 6RedHattomcat6-0:6.0.41-17_patch_04.ep6.el6*
Red Hat JBoss Enterprise Web Server 2 for RHEL 6RedHattomcat7-0:7.0.54-25_patch_05.ep6.el6*
Red Hat JBoss Enterprise Web Server 2 for RHEL 7RedHatjbcs-httpd24-openssl-1:1.0.2h-13.jbcs.el7*
Red Hat JBoss Enterprise Web Server 2 for RHEL 7RedHattomcat6-0:6.0.41-17_patch_04.ep6.el7*
Red Hat JBoss Enterprise Web Server 2 for RHEL 7RedHattomcat7-0:7.0.54-25_patch_05.ep6.el7*
Red Hat JBoss Web Server 2.1RedHatopenssl*
Red Hat JBoss Web Server 3.1RedHat*
Red Hat JBoss Web Server 3 for RHEL 6RedHatlog4j-eap6-0:1.2.16-12.redhat_3.1.ep6.el6*
Red Hat JBoss Web Server 3 for RHEL 6RedHattomcat7-0:7.0.70-22.ep7.el6*
Red Hat JBoss Web Server 3 for RHEL 6RedHattomcat8-0:8.0.36-24.ep7.el6*
Red Hat JBoss Web Server 3 for RHEL 6RedHattomcat-native-0:1.2.8-10.redhat_10.ep7.el6*
Red Hat JBoss Web Server 3 for RHEL 7RedHatlog4j-eap6-0:1.2.16-12.redhat_3.1.ep6.el7*
Red Hat JBoss Web Server 3 for RHEL 7RedHattomcat7-0:7.0.70-22.ep7.el7*
Red Hat JBoss Web Server 3 for RHEL 7RedHattomcat8-0:8.0.36-24.ep7.el7*
Red Hat JBoss Web Server 3 for RHEL 7RedHattomcat-native-0:1.2.8-10.redhat_10.ep7.el7*
Text-Only JBCSRedHat*
Gnutls26Ubuntuesm-infra-legacy/trusty*
Gnutls26Ubuntuprecise*
Gnutls26Ubuntutrusty*
Gnutls26Ubuntutrusty/esm*
Gnutls28Ubuntuesm-infra/xenial*
Gnutls28Ubuntuprecise*
Gnutls28Ubuntutrusty*
Gnutls28Ubuntuvivid/stable-phone-overlay*
Gnutls28Ubuntuvivid/ubuntu-core*
Gnutls28Ubuntuxenial*
Gnutls28Ubuntuyakkety*
OpensslUbuntuartful*
OpensslUbuntubionic*
OpensslUbuntucosmic*
OpensslUbuntudevel*
OpensslUbuntudisco*
OpensslUbuntuesm-infra-legacy/trusty*
OpensslUbuntuesm-infra/bionic*
OpensslUbuntuesm-infra/xenial*
OpensslUbuntuprecise*
OpensslUbuntutrusty*
OpensslUbuntutrusty/esm*
OpensslUbuntuvivid/stable-phone-overlay*
OpensslUbuntuvivid/ubuntu-core*
OpensslUbuntuxenial*
OpensslUbuntuyakkety*
OpensslUbuntuzesty*
Openssl098Ubuntuprecise*
Openssl098Ubuntutrusty*

Potential Mitigations

  • Mitigation of resource exhaustion attacks requires that the target system either:

  • The first of these solutions is an issue in itself though, since it may allow attackers to prevent the use of the system by a particular valid user. If the attacker impersonates the valid user, they may be able to prevent the user from accessing the server in question.

  • The second solution is simply difficult to effectively institute – and even when properly done, it does not provide a full solution. It simply makes the attack require more resources on the part of the attacker.

References