{"id":"CVE-2016-8610","details":"A denial of service flaw was found in OpenSSL 0.9.8, 1.0.1, 1.0.2 through 1.0.2h, and 1.1.0 in the way the TLS/SSL protocol defined processing of ALERT packets during a connection handshake. A remote attacker could use this flaw to make a TLS/SSL server consume an excessive amount of CPU and fail to accept connections from other clients.","modified":"2026-04-16T06:20:23.981824758Z","published":"2017-11-13T22:29:00.203Z","related":["SUSE-SU-2017:0304-1","SUSE-SU-2017:0348-1","SUSE-SU-2017:0461-1","SUSE-SU-2017:0495-1","SUSE-SU-2017:0585-1","SUSE-SU-2017:0601-1","SUSE-SU-2017:0605-1","SUSE-SU-2017:2700-1","SUSE-SU-2018:0112-1","SUSE-SU-2018:3864-1","SUSE-SU-2018:3864-2","SUSE-SU-2018:3964-1","SUSE-SU-2018:3994-1","SUSE-SU-2018:4068-1","SUSE-SU-2018:4274-1","SUSE-SU-2019:1553-1","openSUSE-SU-2024:10801-1"],"references":[{"type":"WEB","url":"https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commit%3Bh=af58be768ebb690f78530f796e92b8ae5c9a4401"},{"type":"ADVISORY","url":"http://rhn.redhat.com/errata/RHSA-2017-1659.html"},{"type":"ADVISORY","url":"http://seclists.org/oss-sec/2016/q4/224"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2017:2493"},{"type":"ADVISORY","url":"https://security.paloaltonetworks.com/CVE-2016-8610"},{"type":"ADVISORY","url":"https://www.debian.org/security/2017/dsa-3773"},{"type":"ADVISORY","url":"http://rhn.redhat.com/errata/RHSA-2017-0286.html"},{"type":"ADVISORY","url":"http://rhn.redhat.com/errata/RHSA-2017-0574.html"},{"type":"ADVISORY","url":"http://rhn.redhat.com/errata/RHSA-2017-1415.html"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2017:1413"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2017:1414"},{"type":"ADVISORY","url":"https://security.FreeBSD.org/advisories/FreeBSD-SA-16:35.openssl.asc"},{"type":"ADVISORY","url":"https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03897en_us"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2017:2494"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2017:1801"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2017:1802"},{"type":"ADVISORY","url":"http://www.securityfocus.com/bid/93841"},{"type":"ADVISORY","url":"http://www.securitytracker.com/id/1037084"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2017:1658"},{"type":"ADVISORY","url":"https://security.360.cn/cve/CVE-2016-8610/"},{"type":"ADVISORY","url":"https://security.netapp.com/advisory/ntap-20171130-0001/"},{"type":"FIX","url":"https://www.oracle.com/security-alerts/cpujul2020.html"},{"type":"FIX","url":"https://www.oracle.com/security-alerts/cpuoct2020.html"},{"type":"FIX","url":"https://www.oracle.com/security-alerts/cpuapr2020.html"},{"type":"FIX","url":"https://www.oracle.com/security-alerts/cpujan2020.html"},{"type":"FIX","url":"https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html"},{"type":"FIX","url":"https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html"},{"type":"FIX","url":"https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-8610"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/openssl/openssl","events":[{"introduced":"e818b74be2170fbe957a07b0da4401c2b694b3b8"},{"last_affected":"e818b74be2170fbe957a07b0da4401c2b694b3b8"},{"introduced":"0"},{"last_affected":"c2ef67100cd0ca2321b5f1a437abb93fc7e11e37"},{"introduced":"0"},{"last_affected":"888759a1d38197f29de7227876c3b58fbff8549f"},{"introduced":"0"},{"last_affected":"7ea5bd2b52d0e81eaef3d109b3b12545306f201c"}],"database_specific":{"versions":[{"introduced":"1.0.2"},{"last_affected":"1.0.2h"},{"introduced":"0"},{"last_affected":"0.9.8"},{"introduced":"0"},{"last_affected":"1.0.1"},{"introduced":"0"},{"last_affected":"1.1.0"}]}}],"versions":["BEFORE_engine","OpenSSL_0_9_1c","OpenSSL_0_9_2b","OpenSSL_0_9_3","OpenSSL_0_9_3a","OpenSSL_0_9_3beta2","OpenSSL_0_9_4","OpenSSL_0_9_5a","OpenSSL_0_9_5a-beta1","OpenSSL_0_9_5a-beta2","OpenSSL_0_9_5beta1","OpenSSL_0_9_5beta2","OpenSSL_0_9_6-beta3","OpenSSL_0_9_8","OpenSSL_0_9_8-beta1","OpenSSL_0_9_8-beta2","OpenSSL_0_9_8-beta4","OpenSSL_0_9_8-beta5","OpenSSL_0_9_8-beta6","OpenSSL_0_9_8-post-auto-reformat","OpenSSL_0_9_8-post-reformat","OpenSSL_0_9_8-pre-auto-reformat","OpenSSL_0_9_8-pre-reformat","OpenSSL_0_9_8a","OpenSSL_0_9_8b","OpenSSL_0_9_8c","OpenSSL_0_9_8d","OpenSSL_0_9_8e","OpenSSL_0_9_8h","OpenSSL_0_9_8i","OpenSSL_0_9_8j","OpenSSL_0_9_8m","OpenSSL_0_9_8m-beta1","OpenSSL_0_9_8n","OpenSSL_0_9_8o","OpenSSL_0_9_8p","OpenSSL_0_9_8q","OpenSSL_0_9_8r","OpenSSL_0_9_8s","OpenSSL_0_9_8t","OpenSSL_0_9_8u","OpenSSL_0_9_8v","OpenSSL_0_9_8w","OpenSSL_0_9_8x","OpenSSL_0_9_8y","OpenSSL_0_9_8za","OpenSSL_0_9_8zb","OpenSSL_0_9_8zc","OpenSSL_0_9_8zd","OpenSSL_0_9_8ze","OpenSSL_0_9_8zf","OpenSSL_0_9_8zg","OpenSSL_0_9_8zh","OpenSSL_1_0_1","OpenSSL_1_0_1-beta1","OpenSSL_1_0_1-beta2","OpenSSL_1_0_1-beta3","OpenSSL_1_0_1-post-auto-reformat","OpenSSL_1_0_1-post-reformat","OpenSSL_1_0_1-pre-auto-reformat","OpenSSL_1_0_1-pre-reformat","OpenSSL_1_0_1a","OpenSSL_1_0_1b","OpenSSL_1_0_1c","OpenSSL_1_0_1d","OpenSSL_1_0_1e","OpenSSL_1_0_1f","OpenSSL_1_0_1g","OpenSSL_1_0_1h","OpenSSL_1_0_1i","OpenSSL_1_0_1j","OpenSSL_1_0_1k","OpenSSL_1_0_1l","OpenSSL_1_0_1m","OpenSSL_1_0_1n","OpenSSL_1_0_1o","OpenSSL_1_0_1p","OpenSSL_1_0_1q","OpenSSL_1_0_1r","OpenSSL_1_0_1s","OpenSSL_1_0_1t","OpenSSL_1_0_1u","OpenSSL_1_0_2u","OpenSSL_1_1_0","OpenSSL_1_1_0-pre1","OpenSSL_1_1_0-pre2","OpenSSL_1_1_0-pre3","OpenSSL_1_1_0-pre4","OpenSSL_1_1_0-pre5","OpenSSL_1_1_0-pre6","OpenSSL_1_1_0a","OpenSSL_1_1_0b","OpenSSL_1_1_0c","OpenSSL_1_1_0d","OpenSSL_1_1_0e","OpenSSL_1_1_0f","OpenSSL_1_1_0g","OpenSSL_1_1_0h","OpenSSL_1_1_0i","OpenSSL_1_1_0j","OpenSSL_1_1_0k","OpenSSL_1_1_0l","master-post-auto-reformat","master-post-reformat","master-pre-auto-reformat","master-pre-reformat"],"database_specific":{"unresolved_ranges":[{"events":[{"introduced":"0"},{"last_affected":"8.0"}]},{"events":[{"introduced":"0"},{"last_affected":"6.0"}]},{"events":[{"introduced":"0"},{"last_affected":"7.0"}]},{"events":[{"introduced":"0"},{"last_affected":"6.0"}]},{"events":[{"introduced":"0"},{"last_affected":"7.0"}]},{"events":[{"introduced":"0"},{"last_affected":"7.3"}]},{"events":[{"introduced":"0"},{"last_affected":"7.4"}]},{"events":[{"introduced":"0"},{"last_affected":"7.6"}]},{"events":[{"introduced":"0"},{"last_affected":"7.3"}]},{"events":[{"introduced":"0"},{"last_affected":"7.4"}]},{"events":[{"introduced":"0"},{"last_affected":"7.5"}]},{"events":[{"introduced":"0"},{"last_affected":"7.6"}]},{"events":[{"introduced":"0"},{"last_affected":"7.3"}]},{"events":[{"introduced":"0"},{"last_affected":"7.6"}]},{"events":[{"introduced":"0"},{"last_affected":"6.0"}]},{"events":[{"introduced":"0"},{"last_affected":"7.0"}]},{"events":[{"introduced":"0"},{"last_affected":"6.0.0"}]},{"events":[{"introduced":"0"},{"last_affected":"6.4.0"}]},{"events":[{"introduced":"11.0"},{"last_affected":"11.40"}]},{"events":[{"introduced":"0"},{"last_affected":"6.1.17"}]},{"events":[{"introduced":"7.0.0"},{"last_affected":"7.0.15"}]},{"events":[{"introduced":"7.1.0"},{"last_affected":"7.1.10"}]},{"events":[{"introduced":"0"},{"last_affected":"11.1.2.3.0"}]},{"events":[{"introduced":"0"},{"last_affected":"13.3.0.1"}]},{"events":[{"introduced":"0"},{"last_affected":"12.1.1"}]},{"events":[{"introduced":"0"},{"last_affected":"7.3.4"}]},{"events":[{"introduced":"0"},{"last_affected":"7.4.0"}]},{"events":[{"introduced":"0"},{"last_affected":"11.2.0.4"}]},{"events":[{"introduced":"0"},{"last_affected":"12.1.0.2"}]},{"events":[{"introduced":"0"},{"last_affected":"12.2.0.1"}]},{"events":[{"introduced":"0"},{"last_affected":"18c"}]},{"events":[{"introduced":"0"},{"last_affected":"19c"}]},{"events":[{"introduced":"0"},{"last_affected":"12.3.3"}]},{"events":[{"introduced":"0"},{"last_affected":"12.4.0"}]},{"events":[{"introduced":"0"},{"last_affected":"12.3.2.1.0"}]},{"events":[{"introduced":"0"},{"last_affected":"9.2"}]},{"events":[{"introduced":"0"},{"last_affected":"8.56"}]},{"events":[{"introduced":"0"},{"last_affected":"8.57"}]},{"events":[{"introduced":"0"},{"last_affected":"8.58"}]},{"events":[{"introduced":"0"},{"last_affected":"15.0.3"}]},{"events":[{"introduced":"0"},{"last_affected":"16.0.3"}]},{"events":[{"introduced":"0"},{"fixed":"18.1.4.1.0"}]},{"events":[{"introduced":"0"},{"last_affected":"10.3.6.0.0"}]},{"events":[{"introduced":"0"},{"last_affected":"12.1.3.0.0"}]},{"events":[{"introduced":"0"},{"last_affected":"12.2.1.3.0"}]},{"events":[{"introduced":"0"},{"last_affected":"12.2.1.4.0"}]},{"events":[{"introduced":"0"},{"fixed":"xcp2361"}]},{"events":[{"introduced":"xcp3000"},{"fixed":"xcp3070"}]},{"events":[{"introduced":"0"},{"fixed":"xcp2361"}]},{"events":[{"introduced":"xcp3000"},{"fixed":"xcp3070"}]},{"events":[{"introduced":"0"},{"fixed":"xcp2361"}]},{"events":[{"introduced":"xcp3000"},{"fixed":"xcp3070"}]},{"events":[{"introduced":"0"},{"fixed":"xcp2361"}]},{"events":[{"introduced":"xcp3000"},{"fixed":"xcp3070"}]},{"events":[{"introduced":"0"},{"fixed":"xcp2361"}]},{"events":[{"introduced":"xcp3000"},{"fixed":"xcp3070"}]},{"events":[{"introduced":"0"},{"fixed":"xcp2361"}]},{"events":[{"introduced":"xcp3000"},{"fixed":"xcp3070"}]}],"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2016-8610.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}]}