ALT-PU-2017-2851-1
Closed vulnerabilities
BDU:2016-01470
Уязвимость библиотеки парсинга Expat, позволяющая нарушителю вызвать отказ в обслуживании или выполнить произвольный код
BDU:2016-01683
Уязвимость библиотеки Expat, позволяющая нарушителю вызвать отказ в обслуживании или выполнить произвольный код
BDU:2018-00112
Уязвимость функции entityValueInitProcessor библиотеки для анализа XML-файлов libexpat, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2021-03140
Уязвимость алгоритмов шифрования DES и Triple DES, связанная с отсутствием защиты служебных данных, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации
Modified: 2025-04-12
CVE-2015-1283
Multiple integer overflows in the XML_GetBuffer function in Expat through 2.1.0, as used in Google Chrome before 44.0.2403.89 and other products, allow remote attackers to cause a denial of service (heap-based buffer overflow) or possibly have unspecified other impact via crafted XML data, a related issue to CVE-2015-2716.
- http://googlechromereleases.blogspot.com/2015/07/stable-channel-update_21.html
- http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00038.html
- http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00064.html
- http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00006.html
- http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00007.html
- http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00010.html
- http://rhn.redhat.com/errata/RHSA-2015-1499.html
- http://www.debian.org/security/2015/dsa-3315
- http://www.debian.org/security/2015/dsa-3318
- http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html
- http://www.securityfocus.com/bid/75973
- http://www.securitytracker.com/id/1033031
- http://www.ubuntu.com/usn/USN-2726-1
- https://code.google.com/p/chromium/issues/detail?id=492052
- https://codereview.chromium.org/1224303003
- https://kc.mcafee.com/corporate/index?page=content&id=SB10365
- https://security.gentoo.org/glsa/201603-09
- https://security.gentoo.org/glsa/201701-21
- https://source.android.com/security/bulletin/2016-11-01.html
- https://www.tenable.com/security/tns-2016-20
- http://googlechromereleases.blogspot.com/2015/07/stable-channel-update_21.html
- http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00038.html
- http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00064.html
- http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00006.html
- http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00007.html
- http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00010.html
- http://rhn.redhat.com/errata/RHSA-2015-1499.html
- http://www.debian.org/security/2015/dsa-3315
- http://www.debian.org/security/2015/dsa-3318
- http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html
- http://www.securityfocus.com/bid/75973
- http://www.securitytracker.com/id/1033031
- http://www.ubuntu.com/usn/USN-2726-1
- https://code.google.com/p/chromium/issues/detail?id=492052
- https://codereview.chromium.org/1224303003
- https://kc.mcafee.com/corporate/index?page=content&id=SB10365
- https://security.gentoo.org/glsa/201603-09
- https://security.gentoo.org/glsa/201701-21
- https://source.android.com/security/bulletin/2016-11-01.html
- https://www.tenable.com/security/tns-2016-20
Modified: 2025-04-12
CVE-2016-0718
Expat allows context-dependent attackers to cause a denial of service (crash) or possibly execute arbitrary code via a malformed input document, which triggers a buffer overflow.
- http://lists.apple.com/archives/security-announce/2016/Jul/msg00000.html
- http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00064.html
- http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00006.html
- http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00007.html
- http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00010.html
- http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00004.html
- http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00029.html
- http://packetstormsecurity.com/files/141350/ESET-Endpoint-Antivirus-6-Remote-Code-Execution.html
- http://rhn.redhat.com/errata/RHSA-2016-2824.html
- http://seclists.org/fulldisclosure/2017/Feb/68
- http://support.eset.com/ca6333/
- http://www.debian.org/security/2016/dsa-3582
- http://www.mozilla.org/security/announce/2016/mfsa2016-68.html
- http://www.openwall.com/lists/oss-security/2016/05/17/12
- http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html
- http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html
- http://www.securityfocus.com/bid/90729
- http://www.securitytracker.com/id/1036348
- http://www.securitytracker.com/id/1036415
- http://www.securitytracker.com/id/1037705
- http://www.ubuntu.com/usn/USN-2983-1
- http://www.ubuntu.com/usn/USN-3044-1
- https://access.redhat.com/errata/RHSA-2018:2486
- https://bugzilla.mozilla.org/show_bug.cgi?id=1236923
- https://bugzilla.redhat.com/show_bug.cgi?id=1296102
- https://kc.mcafee.com/corporate/index?page=content&id=SB10365
- https://security.gentoo.org/glsa/201701-21
- https://source.android.com/security/bulletin/2016-11-01.html
- https://support.apple.com/HT206903
- https://www.tenable.com/security/tns-2016-20
- http://lists.apple.com/archives/security-announce/2016/Jul/msg00000.html
- http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00064.html
- http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00006.html
- http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00007.html
- http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00010.html
- http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00004.html
- http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00029.html
- http://packetstormsecurity.com/files/141350/ESET-Endpoint-Antivirus-6-Remote-Code-Execution.html
- http://rhn.redhat.com/errata/RHSA-2016-2824.html
- http://seclists.org/fulldisclosure/2017/Feb/68
- http://support.eset.com/ca6333/
- http://www.debian.org/security/2016/dsa-3582
- http://www.mozilla.org/security/announce/2016/mfsa2016-68.html
- http://www.openwall.com/lists/oss-security/2016/05/17/12
- http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html
- http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html
- http://www.securityfocus.com/bid/90729
- http://www.securitytracker.com/id/1036348
- http://www.securitytracker.com/id/1036415
- http://www.securitytracker.com/id/1037705
- http://www.ubuntu.com/usn/USN-2983-1
- http://www.ubuntu.com/usn/USN-3044-1
- https://access.redhat.com/errata/RHSA-2018:2486
- https://bugzilla.mozilla.org/show_bug.cgi?id=1236923
- https://bugzilla.redhat.com/show_bug.cgi?id=1296102
- https://kc.mcafee.com/corporate/index?page=content&id=SB10365
- https://security.gentoo.org/glsa/201701-21
- https://source.android.com/security/bulletin/2016-11-01.html
- https://support.apple.com/HT206903
- https://www.tenable.com/security/tns-2016-20
Modified: 2025-04-12
CVE-2016-0772
The smtplib library in CPython (aka Python) before 2.7.12, 3.x before 3.4.5, and 3.5.x before 3.5.2 does not return an error when StartTLS fails, which might allow man-in-the-middle attackers to bypass the TLS protections by leveraging a network position between the client and the registry to block the StartTLS command, aka a "StartTLS stripping attack."
- http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00040.html
- http://rhn.redhat.com/errata/RHSA-2016-1626.html
- http://rhn.redhat.com/errata/RHSA-2016-1627.html
- http://rhn.redhat.com/errata/RHSA-2016-1628.html
- http://rhn.redhat.com/errata/RHSA-2016-1629.html
- http://rhn.redhat.com/errata/RHSA-2016-1630.html
- http://www.openwall.com/lists/oss-security/2016/06/14/9
- http://www.securityfocus.com/bid/91225
- http://www.splunk.com/view/SP-CAAAPSV
- http://www.splunk.com/view/SP-CAAAPUE
- https://bugzilla.redhat.com/show_bug.cgi?id=1303647
- https://docs.python.org/3.4/whatsnew/changelog.html#python-3-4-5
- https://docs.python.org/3.5/whatsnew/changelog.html#python-3-5-2
- https://hg.python.org/cpython/raw-file/v2.7.12/Misc/NEWS
- https://hg.python.org/cpython/rev/b3ce713fb9be
- https://hg.python.org/cpython/rev/d590114c2394
- https://lists.debian.org/debian-lts-announce/2019/02/msg00011.html
- https://security.gentoo.org/glsa/201701-18
- http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00040.html
- http://rhn.redhat.com/errata/RHSA-2016-1626.html
- http://rhn.redhat.com/errata/RHSA-2016-1627.html
- http://rhn.redhat.com/errata/RHSA-2016-1628.html
- http://rhn.redhat.com/errata/RHSA-2016-1629.html
- http://rhn.redhat.com/errata/RHSA-2016-1630.html
- http://www.openwall.com/lists/oss-security/2016/06/14/9
- http://www.securityfocus.com/bid/91225
- http://www.splunk.com/view/SP-CAAAPSV
- http://www.splunk.com/view/SP-CAAAPUE
- https://bugzilla.redhat.com/show_bug.cgi?id=1303647
- https://docs.python.org/3.4/whatsnew/changelog.html#python-3-4-5
- https://docs.python.org/3.5/whatsnew/changelog.html#python-3-5-2
- https://hg.python.org/cpython/raw-file/v2.7.12/Misc/NEWS
- https://hg.python.org/cpython/rev/b3ce713fb9be
- https://hg.python.org/cpython/rev/d590114c2394
- https://lists.debian.org/debian-lts-announce/2019/02/msg00011.html
- https://security.gentoo.org/glsa/201701-18
Modified: 2024-11-21
CVE-2016-1000110
The CGIHandler class in Python before 2.7.12 does not protect against the HTTP_PROXY variable name clash in a CGI script, which could allow a remote attacker to redirect HTTP requests.
- http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00040.html
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-1000110
- https://bugzilla.suse.com/show_bug.cgi?id=CVE-2016-1000110
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7K3WFJO3SJQCODKRKU6EQV3ZGHH53YPU/
- https://security-tracker.debian.org/tracker/CVE-2016-1000110
- http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00040.html
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-1000110
- https://bugzilla.suse.com/show_bug.cgi?id=CVE-2016-1000110
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7K3WFJO3SJQCODKRKU6EQV3ZGHH53YPU/
- https://security-tracker.debian.org/tracker/CVE-2016-1000110
Modified: 2025-04-12
CVE-2016-2183
The DES and Triple DES ciphers, as used in the TLS, SSH, and IPSec protocols and other protocols and products, have a birthday bound of approximately four billion blocks, which makes it easier for remote attackers to obtain cleartext data via a birthday attack against a long-duration encrypted session, as demonstrated by an HTTPS session using Triple DES in CBC mode, aka a "Sweet32" attack.
- http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10759
- http://lists.opensuse.org/opensuse-security-announce/2016-09/msg00022.html
- http://lists.opensuse.org/opensuse-security-announce/2016-09/msg00023.html
- http://lists.opensuse.org/opensuse-security-announce/2016-09/msg00024.html
- http://lists.opensuse.org/opensuse-security-announce/2016-09/msg00031.html
- http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00005.html
- http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00011.html
- http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00012.html
- http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00013.html
- http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00021.html
- http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00029.html
- http://lists.opensuse.org/opensuse-security-announce/2017-01/msg00068.html
- http://lists.opensuse.org/opensuse-security-announce/2017-02/msg00003.html
- http://lists.opensuse.org/opensuse-security-announce/2017-02/msg00023.html
- http://lists.opensuse.org/opensuse-security-announce/2017-02/msg00028.html
- http://lists.opensuse.org/opensuse-security-announce/2017-02/msg00032.html
- http://lists.opensuse.org/opensuse-security-announce/2017-05/msg00076.html
- http://lists.opensuse.org/opensuse-security-announce/2017-10/msg00010.html
- http://lists.opensuse.org/opensuse-security-announce/2017-10/msg00011.html
- http://lists.opensuse.org/opensuse-security-announce/2018-02/msg00032.html
- http://packetstormsecurity.com/files/142756/IBM-Informix-Dynamic-Server-DLL-Injection-Code-Execution.html
- http://rhn.redhat.com/errata/RHSA-2017-0336.html
- http://rhn.redhat.com/errata/RHSA-2017-0337.html
- http://rhn.redhat.com/errata/RHSA-2017-0338.html
- http://rhn.redhat.com/errata/RHSA-2017-0462.html
- http://seclists.org/fulldisclosure/2017/Jul/31
- http://seclists.org/fulldisclosure/2017/May/105
- http://seclists.org/fulldisclosure/2017/May/105
- http://seclists.org/fulldisclosure/2017/May/105
- http://seclists.org/fulldisclosure/2017/May/105
- http://www-01.ibm.com/support/docview.wss?uid=nas8N1021697
- http://www-01.ibm.com/support/docview.wss?uid=swg21991482
- http://www-01.ibm.com/support/docview.wss?uid=swg21995039
- http://www.debian.org/security/2016/dsa-3673
- http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20170322-01-openssl-en
- http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html
- http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html
- http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html
- http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html
- http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2016-3090545.html
- http://www.oracle.com/technetwork/topics/security/ovmbulletinoct2016-3090547.html
- http://www.securityfocus.com/archive/1/539885/100/0/threaded
- http://www.securityfocus.com/archive/1/540341/100/0/threaded
- http://www.securityfocus.com/archive/1/541104/100/0/threaded
- http://www.securityfocus.com/archive/1/542005/100/0/threaded
- http://www.securityfocus.com/archive/1/archive/1/539885/100/0/threaded
- http://www.securityfocus.com/archive/1/archive/1/540129/100/0/threaded
- http://www.securityfocus.com/archive/1/archive/1/540341/100/0/threaded
- http://www.securityfocus.com/archive/1/archive/1/541104/100/0/threaded
- http://www.securityfocus.com/archive/1/archive/1/542005/100/0/threaded
- http://www.securityfocus.com/bid/92630
- http://www.securityfocus.com/bid/95568
- http://www.securitytracker.com/id/1036696
- http://www.splunk.com/view/SP-CAAAPSV
- http://www.splunk.com/view/SP-CAAAPUE
- http://www.ubuntu.com/usn/USN-3087-1
- http://www.ubuntu.com/usn/USN-3087-2
- http://www.ubuntu.com/usn/USN-3179-1
- http://www.ubuntu.com/usn/USN-3194-1
- http://www.ubuntu.com/usn/USN-3198-1
- http://www.ubuntu.com/usn/USN-3270-1
- http://www.ubuntu.com/usn/USN-3372-1
- https://access.redhat.com/articles/2548661
- https://access.redhat.com/errata/RHSA-2017:1216
- https://access.redhat.com/errata/RHSA-2017:2708
- https://access.redhat.com/errata/RHSA-2017:2709
- https://access.redhat.com/errata/RHSA-2017:2710
- https://access.redhat.com/errata/RHSA-2017:3113
- https://access.redhat.com/errata/RHSA-2017:3114
- https://access.redhat.com/errata/RHSA-2017:3239
- https://access.redhat.com/errata/RHSA-2017:3240
- https://access.redhat.com/errata/RHSA-2018:2123
- https://access.redhat.com/errata/RHSA-2019:1245
- https://access.redhat.com/errata/RHSA-2019:2859
- https://access.redhat.com/errata/RHSA-2020:0451
- https://access.redhat.com/security/cve/cve-2016-2183
- https://blog.cryptographyengineering.com/2016/08/24/attack-of-week-64-bit-ciphers-in-tls/
- https://bto.bluecoat.com/security-advisory/sa133
- https://bugzilla.redhat.com/show_bug.cgi?id=1369383
- https://cert-portal.siemens.com/productcert/pdf/ssa-412672.pdf
- https://github.com/ssllabs/ssllabs-scan/issues/387#issuecomment-242514633
- https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c05302448
- https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c05369403
- https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c05369415
- https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c05385680
- https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c05390722
- https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c05390849
- https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbgn03765en_us
- https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03725en_us
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05302448
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05309984
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05323116
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05349499
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05356388
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05369403
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05369415
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05385680
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390849
- https://ics-cert.us-cert.gov/advisories/ICSMA-18-058-02
- https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA40312
- https://kc.mcafee.com/corporate/index?page=content&id=SB10171
- https://kc.mcafee.com/corporate/index?page=content&id=SB10186
- https://kc.mcafee.com/corporate/index?page=content&id=SB10197
- https://kc.mcafee.com/corporate/index?page=content&id=SB10215
- https://kc.mcafee.com/corporate/index?page=content&id=SB10310
- https://nakedsecurity.sophos.com/2016/08/25/anatomy-of-a-cryptographic-collision-the-sweet32-attack/
- https://nodejs.org/en/blog/vulnerability/september-2016-security-releases/
- https://seclists.org/bugtraq/2018/Nov/21
- https://security.gentoo.org/glsa/201612-16
- https://security.gentoo.org/glsa/201701-65
- https://security.gentoo.org/glsa/201707-01
- https://security.netapp.com/advisory/ntap-20160915-0001/
- https://security.netapp.com/advisory/ntap-20170119-0001/
- https://softwaresupport.softwaregrp.com/document/-/facetsearch/document/KM03158613
- https://softwaresupport.softwaregrp.com/document/-/facetsearch/document/KM03286178
- https://support.f5.com/csp/article/K13167034
- https://sweet32.info/
- https://wiki.opendaylight.org/view/Security_Advisories
- https://www.arista.com/en/support/advisories-notices/security-advisories/1749-security-advisory-24
- https://www.exploit-db.com/exploits/42091/
- https://www.ietf.org/mail-archive/web/tls/current/msg04560.html
- https://www.mitel.com/en-ca/support/security-advisories/mitel-product-security-advisory-17-0008
- https://www.nccgroup.trust/us/about-us/newsroom-and-events/blog/2016/august/new-practical-attacks-on-64-bit-block-ciphers-3des-blowfish/
- https://www.openssl.org/blog/blog/2016/08/24/sweet32/
- https://www.oracle.com/security-alerts/cpuapr2020.html
- https://www.oracle.com/security-alerts/cpujan2020.html
- https://www.oracle.com/security-alerts/cpujul2020.html
- https://www.oracle.com/security-alerts/cpuoct2020.html
- https://www.oracle.com/security-alerts/cpuoct2021.html
- https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html
- https://www.sigsac.org/ccs/CCS2016/accepted-papers/
- https://www.tenable.com/security/tns-2016-16
- https://www.tenable.com/security/tns-2016-20
- https://www.tenable.com/security/tns-2016-21
- https://www.tenable.com/security/tns-2017-09
- https://www.teskalabs.com/blog/teskalabs-bulletin-160826-seacat-sweet32-issue
- http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10759
- http://lists.opensuse.org/opensuse-security-announce/2016-09/msg00022.html
- http://lists.opensuse.org/opensuse-security-announce/2016-09/msg00023.html
- http://lists.opensuse.org/opensuse-security-announce/2016-09/msg00024.html
- http://lists.opensuse.org/opensuse-security-announce/2016-09/msg00031.html
- http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00005.html
- http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00011.html
- http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00012.html
- http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00013.html
- http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00021.html
- http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00029.html
- http://lists.opensuse.org/opensuse-security-announce/2017-01/msg00068.html
- http://lists.opensuse.org/opensuse-security-announce/2017-02/msg00003.html
- http://lists.opensuse.org/opensuse-security-announce/2017-02/msg00023.html
- http://lists.opensuse.org/opensuse-security-announce/2017-02/msg00028.html
- http://lists.opensuse.org/opensuse-security-announce/2017-02/msg00032.html
- http://lists.opensuse.org/opensuse-security-announce/2017-05/msg00076.html
- http://lists.opensuse.org/opensuse-security-announce/2017-10/msg00010.html
- http://lists.opensuse.org/opensuse-security-announce/2017-10/msg00011.html
- http://lists.opensuse.org/opensuse-security-announce/2018-02/msg00032.html
- http://packetstormsecurity.com/files/142756/IBM-Informix-Dynamic-Server-DLL-Injection-Code-Execution.html
- http://rhn.redhat.com/errata/RHSA-2017-0336.html
- http://rhn.redhat.com/errata/RHSA-2017-0337.html
- http://rhn.redhat.com/errata/RHSA-2017-0338.html
- http://rhn.redhat.com/errata/RHSA-2017-0462.html
- http://seclists.org/fulldisclosure/2017/Jul/31
- http://seclists.org/fulldisclosure/2017/May/105
- http://seclists.org/fulldisclosure/2017/May/105
- http://seclists.org/fulldisclosure/2017/May/105
- http://seclists.org/fulldisclosure/2017/May/105
- http://www-01.ibm.com/support/docview.wss?uid=nas8N1021697
- http://www-01.ibm.com/support/docview.wss?uid=swg21991482
- http://www-01.ibm.com/support/docview.wss?uid=swg21995039
- http://www.debian.org/security/2016/dsa-3673
- http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20170322-01-openssl-en
- http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html
- http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html
- http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html
- http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html
- http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2016-3090545.html
- http://www.oracle.com/technetwork/topics/security/ovmbulletinoct2016-3090547.html
- http://www.securityfocus.com/archive/1/539885/100/0/threaded
- http://www.securityfocus.com/archive/1/540341/100/0/threaded
- http://www.securityfocus.com/archive/1/541104/100/0/threaded
- http://www.securityfocus.com/archive/1/542005/100/0/threaded
- http://www.securityfocus.com/archive/1/archive/1/539885/100/0/threaded
- http://www.securityfocus.com/archive/1/archive/1/540129/100/0/threaded
- http://www.securityfocus.com/archive/1/archive/1/540341/100/0/threaded
- http://www.securityfocus.com/archive/1/archive/1/541104/100/0/threaded
- http://www.securityfocus.com/archive/1/archive/1/542005/100/0/threaded
- http://www.securityfocus.com/bid/92630
- http://www.securityfocus.com/bid/95568
- http://www.securitytracker.com/id/1036696
- http://www.splunk.com/view/SP-CAAAPSV
- http://www.splunk.com/view/SP-CAAAPUE
- http://www.ubuntu.com/usn/USN-3087-1
- http://www.ubuntu.com/usn/USN-3087-2
- http://www.ubuntu.com/usn/USN-3179-1
- http://www.ubuntu.com/usn/USN-3194-1
- http://www.ubuntu.com/usn/USN-3198-1
- http://www.ubuntu.com/usn/USN-3270-1
- http://www.ubuntu.com/usn/USN-3372-1
- https://access.redhat.com/articles/2548661
- https://access.redhat.com/errata/RHSA-2017:1216
- https://access.redhat.com/errata/RHSA-2017:2708
- https://access.redhat.com/errata/RHSA-2017:2709
- https://access.redhat.com/errata/RHSA-2017:2710
- https://access.redhat.com/errata/RHSA-2017:3113
- https://access.redhat.com/errata/RHSA-2017:3114
- https://access.redhat.com/errata/RHSA-2017:3239
- https://access.redhat.com/errata/RHSA-2017:3240
- https://access.redhat.com/errata/RHSA-2018:2123
- https://access.redhat.com/errata/RHSA-2019:1245
- https://access.redhat.com/errata/RHSA-2019:2859
- https://access.redhat.com/errata/RHSA-2020:0451
- https://access.redhat.com/security/cve/cve-2016-2183
- https://blog.cryptographyengineering.com/2016/08/24/attack-of-week-64-bit-ciphers-in-tls/
- https://bto.bluecoat.com/security-advisory/sa133
- https://bugzilla.redhat.com/show_bug.cgi?id=1369383
- https://cert-portal.siemens.com/productcert/pdf/ssa-412672.pdf
- https://github.com/ssllabs/ssllabs-scan/issues/387#issuecomment-242514633
- https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c05302448
- https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c05369403
- https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c05369415
- https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c05385680
- https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c05390722
- https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c05390849
- https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbgn03765en_us
- https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03725en_us
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05302448
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05309984
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05323116
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05349499
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05356388
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05369403
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05369415
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05385680
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390849
- https://ics-cert.us-cert.gov/advisories/ICSMA-18-058-02
- https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA40312
- https://kc.mcafee.com/corporate/index?page=content&id=SB10171
- https://kc.mcafee.com/corporate/index?page=content&id=SB10186
- https://kc.mcafee.com/corporate/index?page=content&id=SB10197
- https://kc.mcafee.com/corporate/index?page=content&id=SB10215
- https://kc.mcafee.com/corporate/index?page=content&id=SB10310
- https://nakedsecurity.sophos.com/2016/08/25/anatomy-of-a-cryptographic-collision-the-sweet32-attack/
- https://nodejs.org/en/blog/vulnerability/september-2016-security-releases/
- https://seclists.org/bugtraq/2018/Nov/21
- https://security.gentoo.org/glsa/201612-16
- https://security.gentoo.org/glsa/201701-65
- https://security.gentoo.org/glsa/201707-01
- https://security.netapp.com/advisory/ntap-20160915-0001/
- https://security.netapp.com/advisory/ntap-20170119-0001/
- https://softwaresupport.softwaregrp.com/document/-/facetsearch/document/KM03158613
- https://softwaresupport.softwaregrp.com/document/-/facetsearch/document/KM03286178
- https://support.f5.com/csp/article/K13167034
- https://sweet32.info/
- https://wiki.opendaylight.org/view/Security_Advisories
- https://www.arista.com/en/support/advisories-notices/security-advisories/1749-security-advisory-24
- https://www.exploit-db.com/exploits/42091/
- https://www.ietf.org/mail-archive/web/tls/current/msg04560.html
- https://www.mitel.com/en-ca/support/security-advisories/mitel-product-security-advisory-17-0008
- https://www.nccgroup.trust/us/about-us/newsroom-and-events/blog/2016/august/new-practical-attacks-on-64-bit-block-ciphers-3des-blowfish/
- https://www.openssl.org/blog/blog/2016/08/24/sweet32/
- https://www.oracle.com/security-alerts/cpuapr2020.html
- https://www.oracle.com/security-alerts/cpujan2020.html
- https://www.oracle.com/security-alerts/cpujul2020.html
- https://www.oracle.com/security-alerts/cpuoct2020.html
- https://www.oracle.com/security-alerts/cpuoct2021.html
- https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html
- https://www.sigsac.org/ccs/CCS2016/accepted-papers/
- https://www.tenable.com/security/tns-2016-16
- https://www.tenable.com/security/tns-2016-20
- https://www.tenable.com/security/tns-2016-21
- https://www.tenable.com/security/tns-2017-09
- https://www.teskalabs.com/blog/teskalabs-bulletin-160826-seacat-sweet32-issue
- https://www.vicarius.io/vsociety/posts/cve-2016-2183-detection-sweet32-vulnerability
- https://www.vicarius.io/vsociety/posts/cve-2016-2183-mitigate-sweet32-vulnerability
Modified: 2025-04-12
CVE-2016-4472
The overflow protection in Expat is removed by compilers with certain optimization settings, which allows remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via crafted XML data. NOTE: this vulnerability exists because of an incomplete fix for CVE-2015-1283 and CVE-2015-2716.
- http://www.securityfocus.com/bid/91528
- http://www.ubuntu.com/usn/USN-3013-1
- https://bugzilla.redhat.com/show_bug.cgi?id=1344251
- https://kc.mcafee.com/corporate/index?page=content&id=SB10365
- https://security.gentoo.org/glsa/201701-21
- https://sourceforge.net/p/expat/code_git/ci/f0bec73b018caa07d3e75ec8dd967f3785d71bde
- https://www.tenable.com/security/tns-2016-20
- http://www.securityfocus.com/bid/91528
- http://www.ubuntu.com/usn/USN-3013-1
- https://bugzilla.redhat.com/show_bug.cgi?id=1344251
- https://kc.mcafee.com/corporate/index?page=content&id=SB10365
- https://security.gentoo.org/glsa/201701-21
- https://sourceforge.net/p/expat/code_git/ci/f0bec73b018caa07d3e75ec8dd967f3785d71bde
- https://www.tenable.com/security/tns-2016-20
Modified: 2025-04-12
CVE-2016-5636
Integer overflow in the get_data function in zipimport.c in CPython (aka Python) before 2.7.12, 3.x before 3.4.5, and 3.5.x before 3.5.2 allows remote attackers to have unspecified impact via a negative data size value, which triggers a heap-based buffer overflow.
- http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00040.html
- http://rhn.redhat.com/errata/RHSA-2016-2586.html
- http://www.openwall.com/lists/oss-security/2016/06/15/15
- http://www.openwall.com/lists/oss-security/2016/06/16/1
- http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html
- http://www.securityfocus.com/bid/91247
- http://www.securitytracker.com/id/1038138
- http://www.splunk.com/view/SP-CAAAPSV
- http://www.splunk.com/view/SP-CAAAPUE
- https://bugs.python.org/issue26171
- https://docs.python.org/3.4/whatsnew/changelog.html#python-3-4-5
- https://docs.python.org/3.5/whatsnew/changelog.html#python-3-5-2
- https://hg.python.org/cpython/raw-file/v2.7.12/Misc/NEWS
- https://lists.debian.org/debian-lts-announce/2019/02/msg00011.html
- https://security.gentoo.org/glsa/201701-18
- http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00040.html
- http://rhn.redhat.com/errata/RHSA-2016-2586.html
- http://www.openwall.com/lists/oss-security/2016/06/15/15
- http://www.openwall.com/lists/oss-security/2016/06/16/1
- http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html
- http://www.securityfocus.com/bid/91247
- http://www.securitytracker.com/id/1038138
- http://www.splunk.com/view/SP-CAAAPSV
- http://www.splunk.com/view/SP-CAAAPUE
- https://bugs.python.org/issue26171
- https://docs.python.org/3.4/whatsnew/changelog.html#python-3-4-5
- https://docs.python.org/3.5/whatsnew/changelog.html#python-3-5-2
- https://hg.python.org/cpython/raw-file/v2.7.12/Misc/NEWS
- https://lists.debian.org/debian-lts-announce/2019/02/msg00011.html
- https://security.gentoo.org/glsa/201701-18
Modified: 2024-11-21
CVE-2016-9063
An integer overflow during the parsing of XML using the Expat library. This vulnerability affects Firefox < 50.
- http://www.securityfocus.com/bid/94337
- http://www.securitytracker.com/id/1037298
- http://www.securitytracker.com/id/1039427
- https://bugzilla.mozilla.org/show_bug.cgi?id=1274777
- https://www.debian.org/security/2017/dsa-3898
- https://www.mozilla.org/security/advisories/mfsa2016-89/
- http://www.securityfocus.com/bid/94337
- http://www.securitytracker.com/id/1037298
- http://www.securitytracker.com/id/1039427
- https://bugzilla.mozilla.org/show_bug.cgi?id=1274777
- https://www.debian.org/security/2017/dsa-3898
- https://www.mozilla.org/security/advisories/mfsa2016-89/
Modified: 2025-04-20
CVE-2017-9233
XML External Entity vulnerability in libexpat 2.2.0 and earlier (Expat XML Parser Library) allows attackers to put the parser in an infinite loop using a malformed external entity definition from an external DTD.
- http://www.debian.org/security/2017/dsa-3898
- http://www.openwall.com/lists/oss-security/2017/06/17/7
- http://www.securityfocus.com/bid/99276
- http://www.securitytracker.com/id/1039427
- https://github.com/libexpat/libexpat/blob/master/expat/Changes
- https://libexpat.github.io/doc/cve-2017-9233/
- https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b%40%3Cissues.bookkeeper.apache.org%3E
- https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4%40%3Cissues.bookkeeper.apache.org%3E
- https://support.apple.com/HT208112
- https://support.apple.com/HT208113
- https://support.apple.com/HT208115
- https://support.apple.com/HT208144
- https://support.f5.com/csp/article/K03244804
- http://www.debian.org/security/2017/dsa-3898
- http://www.openwall.com/lists/oss-security/2017/06/17/7
- http://www.securityfocus.com/bid/99276
- http://www.securitytracker.com/id/1039427
- https://github.com/libexpat/libexpat/blob/master/expat/Changes
- https://libexpat.github.io/doc/cve-2017-9233/
- https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b%40%3Cissues.bookkeeper.apache.org%3E
- https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4%40%3Cissues.bookkeeper.apache.org%3E
- https://support.apple.com/HT208112
- https://support.apple.com/HT208113
- https://support.apple.com/HT208115
- https://support.apple.com/HT208144
- https://support.f5.com/csp/article/K03244804