{
  "threat_severity" : "Important",
  "public_date" : "2016-09-22T00:00:00Z",
  "bugzilla" : {
    "description" : "openssl: OCSP Status Request extension unbounded memory growth",
    "id" : "1377600",
    "url" : "https://bugzilla.redhat.com/show_bug.cgi?id=1377600"
  },
  "cvss" : {
    "cvss_base_score" : "5.0",
    "cvss_scoring_vector" : "AV:N/AC:L/Au:N/C:N/I:N/A:P",
    "status" : "verified"
  },
  "cvss3" : {
    "cvss3_base_score" : "7.5",
    "cvss3_scoring_vector" : "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
    "status" : "verified"
  },
  "cwe" : "CWE-400",
  "details" : [ "Multiple memory leaks in t1_lib.c in OpenSSL before 1.0.1u, 1.0.2 before 1.0.2i, and 1.1.0 before 1.1.0a allow remote attackers to cause a denial of service (memory consumption) via large OCSP Status Request extensions.", "A memory leak flaw was found in the way OpenSSL handled TLS status request extension data during session renegotiation. A remote attacker could cause a TLS server using OpenSSL to consume an excessive amount of memory and, possibly, exit unexpectedly after exhausting all available memory, if it enabled OCSP stapling support." ],
  "statement" : "TLS server applications using OpenSSL versions in Red Hat Enterprise Linux 6 and 7 are only affected if they enable OCSP stapling support. Applications not enabling OCSP stapling support are not affected. Few applications implement OCSP stapling support and typically do not enable it by default.",
  "acknowledgement" : "Red Hat would like to thank the OpenSSL project for reporting this issue. Upstream acknowledges Shi Lei (Gear Team of Qihoo 360 Inc.) as the original reporter.",
  "affected_release" : [ {
    "product_name" : "JBoss Core Services on RHEL 6",
    "release_date" : "2017-06-07T00:00:00Z",
    "advisory" : "RHSA-2017:1414",
    "cpe" : "cpe:/a:redhat:jboss_core_services:1::el6",
    "package" : "jbcs-httpd24-httpd-0:2.4.23-120.jbcs.el6"
  }, {
    "product_name" : "JBoss Core Services on RHEL 6",
    "release_date" : "2017-06-07T00:00:00Z",
    "advisory" : "RHSA-2017:1414",
    "cpe" : "cpe:/a:redhat:jboss_core_services:1::el6",
    "package" : "jbcs-httpd24-mod_security-0:2.9.1-19.GA.jbcs.el6"
  }, {
    "product_name" : "JBoss Core Services on RHEL 6",
    "release_date" : "2017-06-07T00:00:00Z",
    "advisory" : "RHSA-2017:1414",
    "cpe" : "cpe:/a:redhat:jboss_core_services:1::el6",
    "package" : "jbcs-httpd24-openssl-1:1.0.2h-13.jbcs.el6"
  }, {
    "product_name" : "JBoss Core Services on RHEL 7",
    "release_date" : "2017-06-07T00:00:00Z",
    "advisory" : "RHSA-2017:1413",
    "cpe" : "cpe:/a:redhat:jboss_core_services:1::el7",
    "package" : "jbcs-httpd24-httpd-0:2.4.23-120.jbcs.el7"
  }, {
    "product_name" : "JBoss Core Services on RHEL 7",
    "release_date" : "2017-06-07T00:00:00Z",
    "advisory" : "RHSA-2017:1413",
    "cpe" : "cpe:/a:redhat:jboss_core_services:1::el7",
    "package" : "jbcs-httpd24-mod_security-0:2.9.1-19.GA.jbcs.el7"
  }, {
    "product_name" : "JBoss Core Services on RHEL 7",
    "release_date" : "2017-06-07T00:00:00Z",
    "advisory" : "RHSA-2017:1413",
    "cpe" : "cpe:/a:redhat:jboss_core_services:1::el7",
    "package" : "jbcs-httpd24-openssl-1:1.0.2h-13.jbcs.el7"
  }, {
    "product_name" : "Red Hat Enterprise Linux 6",
    "release_date" : "2016-09-27T00:00:00Z",
    "advisory" : "RHSA-2016:1940",
    "cpe" : "cpe:/o:redhat:enterprise_linux:6",
    "package" : "openssl-0:1.0.1e-48.el6_8.3"
  }, {
    "product_name" : "Red Hat Enterprise Linux 6.2 Advanced Update Support",
    "release_date" : "2016-11-17T00:00:00Z",
    "advisory" : "RHSA-2016:2802",
    "cpe" : "cpe:/o:redhat:rhel_mission_critical:6.2",
    "package" : "openssl-0:1.0.0-20.el6_2.9"
  }, {
    "product_name" : "Red Hat Enterprise Linux 6.4 Advanced Update Support",
    "release_date" : "2016-11-17T00:00:00Z",
    "advisory" : "RHSA-2016:2802",
    "cpe" : "cpe:/o:redhat:rhel_aus:6.4",
    "package" : "openssl-0:1.0.0-27.el6_4.6"
  }, {
    "product_name" : "Red Hat Enterprise Linux 6.5 Advanced Update Support",
    "release_date" : "2016-11-17T00:00:00Z",
    "advisory" : "RHSA-2016:2802",
    "cpe" : "cpe:/o:redhat:rhel_aus:6.5",
    "package" : "openssl-0:1.0.1e-16.el6_5.17"
  }, {
    "product_name" : "Red Hat Enterprise Linux 6.5 Telco Extended Update Support",
    "release_date" : "2016-11-17T00:00:00Z",
    "advisory" : "RHSA-2016:2802",
    "cpe" : "cpe:/o:redhat:rhel_tus:6.5",
    "package" : "openssl-0:1.0.1e-16.el6_5.17"
  }, {
    "product_name" : "Red Hat Enterprise Linux 6.6 Advanced Update Support",
    "release_date" : "2016-11-17T00:00:00Z",
    "advisory" : "RHSA-2016:2802",
    "cpe" : "cpe:/o:redhat:rhel_aus:6.6",
    "package" : "openssl-0:1.0.1e-30.el6_6.13"
  }, {
    "product_name" : "Red Hat Enterprise Linux 6.6 Telco Extended Update Support",
    "release_date" : "2016-11-17T00:00:00Z",
    "advisory" : "RHSA-2016:2802",
    "cpe" : "cpe:/o:redhat:rhel_tus:6.6",
    "package" : "openssl-0:1.0.1e-30.el6_6.13"
  }, {
    "product_name" : "Red Hat Enterprise Linux 6.7 Extended Update Support",
    "release_date" : "2016-11-17T00:00:00Z",
    "advisory" : "RHSA-2016:2802",
    "cpe" : "cpe:/o:redhat:rhel_eus:6.7",
    "package" : "openssl-0:1.0.1e-42.el6_7.6"
  }, {
    "product_name" : "Red Hat Enterprise Linux 7",
    "release_date" : "2016-09-27T00:00:00Z",
    "advisory" : "RHSA-2016:1940",
    "cpe" : "cpe:/o:redhat:enterprise_linux:7",
    "package" : "openssl-1:1.0.1e-51.el7_2.7"
  }, {
    "product_name" : "Red Hat JBoss Enterprise Application Platform 6.4",
    "release_date" : "2017-06-28T00:00:00Z",
    "advisory" : "RHSA-2017:1659",
    "cpe" : "cpe:/a:redhat:jboss_enterprise_application_platform:6.4",
    "package" : "openssl"
  }, {
    "product_name" : "Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 6",
    "release_date" : "2017-06-28T00:00:00Z",
    "advisory" : "RHSA-2017:1658",
    "cpe" : "cpe:/a:redhat:jboss_enterprise_application_platform:6::el6",
    "package" : "jbcs-httpd24-openssl-1:1.0.2h-13.jbcs.el6"
  }, {
    "product_name" : "Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 7",
    "release_date" : "2017-06-28T00:00:00Z",
    "advisory" : "RHSA-2017:1658",
    "cpe" : "cpe:/a:redhat:jboss_enterprise_application_platform:6::el7",
    "package" : "jbcs-httpd24-openssl-1:1.0.2h-13.jbcs.el7"
  }, {
    "product_name" : "Red Hat JBoss Enterprise Web Server 2 for RHEL 6",
    "release_date" : "2017-08-21T00:00:00Z",
    "advisory" : "RHSA-2017:2493",
    "cpe" : "cpe:/a:redhat:jboss_enterprise_web_server:2::el6",
    "package" : "jbcs-httpd24-openssl-1:1.0.2h-13.jbcs.el6"
  }, {
    "product_name" : "Red Hat JBoss Enterprise Web Server 2 for RHEL 6",
    "release_date" : "2017-08-21T00:00:00Z",
    "advisory" : "RHSA-2017:2493",
    "cpe" : "cpe:/a:redhat:jboss_enterprise_web_server:2::el6",
    "package" : "tomcat6-0:6.0.41-17_patch_04.ep6.el6"
  }, {
    "product_name" : "Red Hat JBoss Enterprise Web Server 2 for RHEL 6",
    "release_date" : "2017-08-21T00:00:00Z",
    "advisory" : "RHSA-2017:2493",
    "cpe" : "cpe:/a:redhat:jboss_enterprise_web_server:2::el6",
    "package" : "tomcat7-0:7.0.54-25_patch_05.ep6.el6"
  }, {
    "product_name" : "Red Hat JBoss Enterprise Web Server 2 for RHEL 7",
    "release_date" : "2017-08-21T00:00:00Z",
    "advisory" : "RHSA-2017:2493",
    "cpe" : "cpe:/a:redhat:jboss_enterprise_web_server:2::el7",
    "package" : "jbcs-httpd24-openssl-1:1.0.2h-13.jbcs.el7"
  }, {
    "product_name" : "Red Hat JBoss Enterprise Web Server 2 for RHEL 7",
    "release_date" : "2017-08-21T00:00:00Z",
    "advisory" : "RHSA-2017:2493",
    "cpe" : "cpe:/a:redhat:jboss_enterprise_web_server:2::el7",
    "package" : "tomcat6-0:6.0.41-17_patch_04.ep6.el7"
  }, {
    "product_name" : "Red Hat JBoss Enterprise Web Server 2 for RHEL 7",
    "release_date" : "2017-08-21T00:00:00Z",
    "advisory" : "RHSA-2017:2493",
    "cpe" : "cpe:/a:redhat:jboss_enterprise_web_server:2::el7",
    "package" : "tomcat7-0:7.0.54-25_patch_05.ep6.el7"
  }, {
    "product_name" : "Red Hat JBoss Web Server 2.1",
    "release_date" : "2017-08-21T00:00:00Z",
    "advisory" : "RHSA-2017:2494",
    "cpe" : "cpe:/a:redhat:jboss_enterprise_web_server:2.1",
    "package" : "openssl"
  }, {
    "product_name" : "Red Hat JBoss Web Server 3.1",
    "release_date" : "2017-07-25T00:00:00Z",
    "advisory" : "RHSA-2017:1802",
    "cpe" : "cpe:/a:redhat:jboss_enterprise_web_server:3.1"
  }, {
    "product_name" : "Red Hat JBoss Web Server 3 for RHEL 6",
    "release_date" : "2017-07-25T00:00:00Z",
    "advisory" : "RHSA-2017:1801",
    "cpe" : "cpe:/a:redhat:jboss_enterprise_web_server:3.1::el6",
    "package" : "log4j-eap6-0:1.2.16-12.redhat_3.1.ep6.el6"
  }, {
    "product_name" : "Red Hat JBoss Web Server 3 for RHEL 6",
    "release_date" : "2017-07-25T00:00:00Z",
    "advisory" : "RHSA-2017:1801",
    "cpe" : "cpe:/a:redhat:jboss_enterprise_web_server:3.1::el6",
    "package" : "tomcat7-0:7.0.70-22.ep7.el6"
  }, {
    "product_name" : "Red Hat JBoss Web Server 3 for RHEL 6",
    "release_date" : "2017-07-25T00:00:00Z",
    "advisory" : "RHSA-2017:1801",
    "cpe" : "cpe:/a:redhat:jboss_enterprise_web_server:3.1::el6",
    "package" : "tomcat8-0:8.0.36-24.ep7.el6"
  }, {
    "product_name" : "Red Hat JBoss Web Server 3 for RHEL 6",
    "release_date" : "2017-07-25T00:00:00Z",
    "advisory" : "RHSA-2017:1801",
    "cpe" : "cpe:/a:redhat:jboss_enterprise_web_server:3.1::el6",
    "package" : "tomcat-native-0:1.2.8-10.redhat_10.ep7.el6"
  }, {
    "product_name" : "Red Hat JBoss Web Server 3 for RHEL 7",
    "release_date" : "2017-07-25T00:00:00Z",
    "advisory" : "RHSA-2017:1801",
    "cpe" : "cpe:/a:redhat:jboss_enterprise_web_server:3.1::el7",
    "package" : "log4j-eap6-0:1.2.16-12.redhat_3.1.ep6.el7"
  }, {
    "product_name" : "Red Hat JBoss Web Server 3 for RHEL 7",
    "release_date" : "2017-07-25T00:00:00Z",
    "advisory" : "RHSA-2017:1801",
    "cpe" : "cpe:/a:redhat:jboss_enterprise_web_server:3.1::el7",
    "package" : "tomcat7-0:7.0.70-22.ep7.el7"
  }, {
    "product_name" : "Red Hat JBoss Web Server 3 for RHEL 7",
    "release_date" : "2017-07-25T00:00:00Z",
    "advisory" : "RHSA-2017:1801",
    "cpe" : "cpe:/a:redhat:jboss_enterprise_web_server:3.1::el7",
    "package" : "tomcat8-0:8.0.36-24.ep7.el7"
  }, {
    "product_name" : "Red Hat JBoss Web Server 3 for RHEL 7",
    "release_date" : "2017-07-25T00:00:00Z",
    "advisory" : "RHSA-2017:1801",
    "cpe" : "cpe:/a:redhat:jboss_enterprise_web_server:3.1::el7",
    "package" : "tomcat-native-0:1.2.8-10.redhat_10.ep7.el7"
  }, {
    "product_name" : "Text-Only JBCS",
    "release_date" : "2017-06-07T00:00:00Z",
    "advisory" : "RHSA-2017:1415",
    "cpe" : "cpe:/a:redhat:jboss_core_services:1"
  } ],
  "package_state" : [ {
    "product_name" : "Red Hat Enterprise Linux 4",
    "fix_state" : "Not affected",
    "package_name" : "openssl",
    "cpe" : "cpe:/o:redhat:enterprise_linux:4"
  }, {
    "product_name" : "Red Hat Enterprise Linux 5",
    "fix_state" : "Not affected",
    "package_name" : "openssl",
    "cpe" : "cpe:/o:redhat:enterprise_linux:5"
  }, {
    "product_name" : "Red Hat Enterprise Linux 5",
    "fix_state" : "Not affected",
    "package_name" : "openssl097a",
    "cpe" : "cpe:/o:redhat:enterprise_linux:5"
  }, {
    "product_name" : "Red Hat Enterprise Linux 6",
    "fix_state" : "Not affected",
    "package_name" : "openssl098e",
    "cpe" : "cpe:/o:redhat:enterprise_linux:6"
  }, {
    "product_name" : "Red Hat Enterprise Linux 7",
    "fix_state" : "Not affected",
    "package_name" : "openssl098e",
    "cpe" : "cpe:/o:redhat:enterprise_linux:7"
  }, {
    "product_name" : "Red Hat JBoss Enterprise Application Platform 5",
    "fix_state" : "Under investigation",
    "package_name" : "openssl",
    "cpe" : "cpe:/a:redhat:jboss_enterprise_application_platform:5"
  }, {
    "product_name" : "Red Hat JBoss Enterprise Web Server 1",
    "fix_state" : "Will not fix",
    "package_name" : "openssl",
    "cpe" : "cpe:/a:redhat:jboss_enterprise_web_server:1"
  }, {
    "product_name" : "Red Hat JBoss Enterprise Web Server 3",
    "fix_state" : "Fix deferred",
    "package_name" : "openssl",
    "cpe" : "cpe:/a:redhat:jboss_enterprise_web_server:3"
  } ],
  "references" : [ "https://www.cve.org/CVERecord?id=CVE-2016-6304\nhttps://nvd.nist.gov/vuln/detail/CVE-2016-6304\nhttps://www.openssl.org/news/secadv/20160922.txt" ],
  "name" : "CVE-2016-6304",
  "csaw" : false
}