Think you have a false positive on this rule?

Sid 1-40843

Message

SERVER-OTHER OpenSSL SSLv3 warning denial of service attempt

Summary

A denial of service flaw was found in OpenSSL 0.9.8, 1.0.1, 1.0.2 through 1.0.2h, and 1.1.0 in the way the TLS/SSL protocol defined processing of ALERT packets during a connection handshake. A remote attacker could use this flaw to make a TLS/SSL server consume an excessive amount of CPU and fail to accept connections from other clients.

Impact

CVSS base score CVSS impact score CVSS exploitability score confidentialityImpact integrityImpact availabilityImpact

CVE-2016-8610:

CVSS base score 7.5

CVSS impact score 3.6

CVSS exploitability score 3.9

Confidentiality Impact NONE

Integrity Impact NONE

Availability Impact HIGH

Detailed information

CVE-2016-8610: A denial of service flaw was found in OpenSSL 0.9.8, 1.0.1, 1.0.2 through 1.0.2h, and 1.1.0 in the way the TLS/SSL protocol defined processing of ALERT packets during a connection handshake. A remote attacker could use this flaw to make a TLS/SSL server consume an excessive amount of CPU and fail to accept connections from other clients.

Affected systems

  • openssl openssl 0.9.8
  • openssl openssl 1.0.1
  • openssl openssl 1.0.2
  • openssl openssl 1.0.2a
  • openssl openssl 1.0.2b
  • openssl openssl 1.0.2c
  • openssl openssl 1.0.2d
  • openssl openssl 1.0.2e
  • openssl openssl 1.0.2f
  • openssl openssl 1.0.2g
  • openssl openssl 1.0.2h
  • openssl openssl 1.1.0

Ease of attack

CVE-2016-8610:

Access Vector

Access Complexity

Authentication

False positives

None known

False negatives

None known

Corrective action

Upgrade to the latest non-affected version of the software.

Apply the appropriate vendor supplied patches.

Contributors

  • Talos research team.
  • This document was generated from data supplied by the national vulnerability database, a product of the national institute of standards and technology.
  • For more information see nvd.

Additional References