{"id":"CVE-2016-0798","details":"Memory leak in the SRP_VBASE_get_by_user implementation in OpenSSL 1.0.1 before 1.0.1s and 1.0.2 before 1.0.2g allows remote attackers to cause a denial of service (memory consumption) by providing an invalid username in a connection attempt, related to apps/s_server.c and crypto/srp/srp_vfy.c.","modified":"2026-04-10T03:45:57.937919Z","published":"2016-03-03T20:59:02.877Z","related":["MGASA-2016-0093","SUSE-FU-2022:0445-1","SUSE-SU-2016:0617-1","SUSE-SU-2016:0620-1","SUSE-SU-2016:0621-1","SUSE-SU-2016:0748-1","SUSE-SU-2016:0786-1","openSUSE-SU-2024:10271-1","openSUSE-SU-2024:10529-1","openSUSE-SU-2024:11127-1"],"references":[{"type":"WEB","url":"https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03741en_us"},{"type":"WEB","url":"http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00003.html"},{"type":"WEB","url":"http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00006.html"},{"type":"WEB","url":"http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00010.html"},{"type":"WEB","url":"https://cert-portal.siemens.com/productcert/pdf/ssa-412672.pdf"},{"type":"WEB","url":"https://www.openssl.org/news/secadv/20160301.txt"},{"type":"WEB","url":"http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00001.html"},{"type":"WEB","url":"http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00002.html"},{"type":"WEB","url":"https://git.openssl.org/?p=openssl.git%3Ba=commit%3Bh=259b664f950c2ba66fbf4b0fe5281327904ead21"},{"type":"WEB","url":"http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10759"},{"type":"WEB","url":"http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00009.html"},{"type":"WEB","url":"http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html"},{"type":"WEB","url":"http://www.securitytracker.com/id/1035133"},{"type":"WEB","url":"https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA40168"},{"type":"WEB","url":"http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00005.html"},{"type":"WEB","url":"http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160302-openssl"},{"type":"WEB","url":"http://www.securityfocus.com/bid/83705"},{"type":"WEB","url":"http://www.securityfocus.com/bid/91787"},{"type":"ADVISORY","url":"http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html"},{"type":"ADVISORY","url":"http://www.ubuntu.com/usn/USN-2914-1"},{"type":"ADVISORY","url":"http://www.debian.org/security/2016/dsa-3500"},{"type":"ADVISORY","url":"http://openssl.org/news/secadv/20160301.txt"},{"type":"ADVISORY","url":"https://security.FreeBSD.org/advisories/FreeBSD-SA-16:12.openssl.asc"},{"type":"ADVISORY","url":"https://security.gentoo.org/glsa/201603-15"},{"type":"ADVISORY","url":"http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/openssl/openssl","events":[{"introduced":"0"},{"last_affected":"888759a1d38197f29de7227876c3b58fbff8549f"},{"introduced":"0"},{"last_affected":"ab585551c0a577d9a91825d446465905a5ea17e3"},{"introduced":"0"},{"last_affected":"e2dfb655f798831ffb29242ad804013ddb0c5d5b"},{"introduced":"0"},{"last_affected":"08e4c7a967cc9d82264d125440d8b17b912bd250"},{"introduced":"0"},{"last_affected":"888759a1d38197f29de7227876c3b58fbff8549f"},{"introduced":"0"},{"last_affected":"888759a1d38197f29de7227876c3b58fbff8549f"},{"introduced":"0"},{"last_affected":"888759a1d38197f29de7227876c3b58fbff8549f"},{"introduced":"0"},{"last_affected":"888759a1d38197f29de7227876c3b58fbff8549f"},{"introduced":"0"},{"last_affected":"888759a1d38197f29de7227876c3b58fbff8549f"},{"introduced":"0"},{"last_affected":"888759a1d38197f29de7227876c3b58fbff8549f"},{"introduced":"0"},{"last_affected":"888759a1d38197f29de7227876c3b58fbff8549f"},{"introduced":"0"},{"last_affected":"888759a1d38197f29de7227876c3b58fbff8549f"},{"introduced":"0"},{"last_affected":"888759a1d38197f29de7227876c3b58fbff8549f"},{"introduced":"0"},{"last_affected":"888759a1d38197f29de7227876c3b58fbff8549f"},{"introduced":"0"},{"last_affected":"888759a1d38197f29de7227876c3b58fbff8549f"},{"introduced":"0"},{"last_affected":"888759a1d38197f29de7227876c3b58fbff8549f"},{"introduced":"0"},{"last_affected":"888759a1d38197f29de7227876c3b58fbff8549f"},{"introduced":"0"},{"last_affected":"888759a1d38197f29de7227876c3b58fbff8549f"},{"introduced":"0"},{"last_affected":"888759a1d38197f29de7227876c3b58fbff8549f"},{"introduced":"0"},{"last_affected":"888759a1d38197f29de7227876c3b58fbff8549f"},{"introduced":"0"},{"last_affected":"888759a1d38197f29de7227876c3b58fbff8549f"},{"introduced":"0"},{"last_affected":"888759a1d38197f29de7227876c3b58fbff8549f"},{"introduced":"0"},{"last_affected":"e818b74be2170fbe957a07b0da4401c2b694b3b8"},{"introduced":"0"},{"last_affected":"94f416601754dbe65e287f8e1eca01fa32f74a7a"},{"introduced":"0"},{"last_affected":"2f63ad1c6daa61614f3d58de0889bf68e9f75853"},{"introduced":"0"},{"last_affected":"2c5db8dac3a06fe5b2c889838a606138ee3542ed"},{"introduced":"0"},{"last_affected":"e818b74be2170fbe957a07b0da4401c2b694b3b8"},{"introduced":"0"},{"last_affected":"e818b74be2170fbe957a07b0da4401c2b694b3b8"},{"introduced":"0"},{"last_affected":"e818b74be2170fbe957a07b0da4401c2b694b3b8"},{"introduced":"0"},{"last_affected":"e818b74be2170fbe957a07b0da4401c2b694b3b8"},{"introduced":"0"},{"last_affected":"e818b74be2170fbe957a07b0da4401c2b694b3b8"},{"introduced":"0"},{"last_affected":"e818b74be2170fbe957a07b0da4401c2b694b3b8"}],"database_specific":{"versions":[{"introduced":"0"},{"last_affected":"1.0.1"},{"introduced":"0"},{"last_affected":"1.0.1-beta1"},{"introduced":"0"},{"last_affected":"1.0.1-beta2"},{"introduced":"0"},{"last_affected":"1.0.1-beta3"},{"introduced":"0"},{"last_affected":"1.0.1a"},{"introduced":"0"},{"last_affected":"1.0.1b"},{"introduced":"0"},{"last_affected":"1.0.1c"},{"introduced":"0"},{"last_affected":"1.0.1d"},{"introduced":"0"},{"last_affected":"1.0.1e"},{"introduced":"0"},{"last_affected":"1.0.1f"},{"introduced":"0"},{"last_affected":"1.0.1g"},{"introduced":"0"},{"last_affected":"1.0.1h"},{"introduced":"0"},{"last_affected":"1.0.1i"},{"introduced":"0"},{"last_affected":"1.0.1j"},{"introduced":"0"},{"last_affected":"1.0.1k"},{"introduced":"0"},{"last_affected":"1.0.1l"},{"introduced":"0"},{"last_affected":"1.0.1m"},{"introduced":"0"},{"last_affected":"1.0.1n"},{"introduced":"0"},{"last_affected":"1.0.1o"},{"introduced":"0"},{"last_affected":"1.0.1p"},{"introduced":"0"},{"last_affected":"1.0.1q"},{"introduced":"0"},{"last_affected":"1.0.1r"},{"introduced":"0"},{"last_affected":"1.0.2"},{"introduced":"0"},{"last_affected":"1.0.2-beta1"},{"introduced":"0"},{"last_affected":"1.0.2-beta2"},{"introduced":"0"},{"last_affected":"1.0.2-beta3"},{"introduced":"0"},{"last_affected":"1.0.2a"},{"introduced":"0"},{"last_affected":"1.0.2b"},{"introduced":"0"},{"last_affected":"1.0.2c"},{"introduced":"0"},{"last_affected":"1.0.2d"},{"introduced":"0"},{"last_affected":"1.0.2e"},{"introduced":"0"},{"last_affected":"1.0.2f"}]}}],"versions":["OpenSSL_1_0_1","OpenSSL_1_0_1-beta1","OpenSSL_1_0_1-beta2","OpenSSL_1_0_1-beta3","OpenSSL_1_0_1-post-auto-reformat","OpenSSL_1_0_1-post-reformat","OpenSSL_1_0_1-pre-auto-reformat","OpenSSL_1_0_1-pre-reformat","OpenSSL_1_0_1a","OpenSSL_1_0_1b","OpenSSL_1_0_1c","OpenSSL_1_0_1d","OpenSSL_1_0_1e","OpenSSL_1_0_1f","OpenSSL_1_0_1g","OpenSSL_1_0_1h","OpenSSL_1_0_1i","OpenSSL_1_0_1j","OpenSSL_1_0_1k","OpenSSL_1_0_1l","OpenSSL_1_0_1m","OpenSSL_1_0_1n","OpenSSL_1_0_1o","OpenSSL_1_0_1p","OpenSSL_1_0_1q","OpenSSL_1_0_1r","OpenSSL_1_0_1s","OpenSSL_1_0_1t","OpenSSL_1_0_1u","OpenSSL_1_0_2","OpenSSL_1_0_2-beta1","OpenSSL_1_0_2-beta2","OpenSSL_1_0_2-beta3","OpenSSL_1_0_2-post-auto-reformat","OpenSSL_1_0_2-post-reformat","OpenSSL_1_0_2-pre-auto-reformat","OpenSSL_1_0_2-pre-reformat","OpenSSL_1_0_2a","OpenSSL_1_0_2b","OpenSSL_1_0_2c","OpenSSL_1_0_2d","OpenSSL_1_0_2e","OpenSSL_1_0_2f","OpenSSL_1_0_2g","OpenSSL_1_0_2h","OpenSSL_1_0_2i","OpenSSL_1_0_2j","OpenSSL_1_0_2k","OpenSSL_1_0_2l","OpenSSL_1_0_2m","OpenSSL_1_0_2n","OpenSSL_1_0_2o","OpenSSL_1_0_2p","OpenSSL_1_0_2q","OpenSSL_1_0_2r","OpenSSL_1_0_2s","OpenSSL_1_0_2t","OpenSSL_1_0_2u"],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2016-0798.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}]}