CVE-2016-2107

Published on: 05/04/2016 12:00:00 AM UTC

Last Modified on: 03/23/2021 11:27:15 PM UTC

CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N

Certain versions of Android from Google contain the following vulnerability:

The AES-NI implementation in OpenSSL before 1.0.1t and 1.0.2 before 1.0.2h does not consider memory allocation during a certain padding check, which allows remote attackers to obtain sensitive cleartext information via a padding-oracle attack against an AES CBC session. NOTE: this vulnerability exists because of an incorrect fix for CVE-2013-0169.

  • CVE-2016-2107 has been assigned by [email protected] to track the vulnerability - currently rated as MEDIUM severity.

CVSS3 Score: 5.9 - MEDIUM

Attack
Vector
Attack
Complexity
Privileges
Required
User
Interaction
NETWORK HIGH NONE NONE
Scope Confidentiality
Impact
Integrity
Impact
Availability
Impact
UNCHANGED HIGH NONE NONE

CVSS2 Score: 2.6 - LOW

Access
Vector
Access
Complexity
Authentication
NETWORK HIGH NONE
Confidentiality
Impact
Integrity
Impact
Availability
Impact
PARTIAL NONE NONE

CVE References

Description Tags Link
[security-announce] openSUSE-SU-2016:1566-1: important: Security update lists.opensuse.org
text/html
URL Logo SUSE openSUSE-SU-2016:1566
Oracle Solaris Bulletin - April 2016 www.oracle.com
text/html
URL Logo CONFIRM www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
USN-2959-1: OpenSSL vulnerabilities | Ubuntu www.ubuntu.com
text/html
URL Logo UBUNTU USN-2959-1
[security-announce] openSUSE-SU-2016:1238-1: important: Security update lists.opensuse.org
text/html
URL Logo SUSE openSUSE-SU-2016:1238
About the security content of OS X El Capitan v10.11.6 and Security Update 2016-004 - Apple Support support.apple.com
text/html
URL Logo CONFIRM support.apple.com/HT206903
[security-announce] openSUSE-SU-2016:1237-1: important: Security update lists.opensuse.org
text/html
URL Logo SUSE openSUSE-SU-2016:1237
Document Display | HPE Support Center h20566.www2.hpe.com
text/html
URL Logo CONFIRM h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbgn03726en_us
Slackware Security Advisory - openssl Updates ≈ Packet Storm packetstormsecurity.com
text/html
URL Logo MISC packetstormsecurity.com/files/136912/Slackware-Security-Advisory-openssl-Updates.html
Oracle Critical Patch Update - July 2016 www.oracle.com
text/html
URL Logo CONFIRM www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html
OpenSSL Padding Oracle Incomplete Fix Information Disclosure Vulnerability cve.report (archive)
text/html
URL Logo BID 89760
APPLE-SA-2016-07-18-1 OS X El Capitan v10.11.6 and Security Update 2016-004 lists.apple.com
text/html
URL Logo APPLE APPLE-SA-2016-07-18-1
Oracle July 2016 Critical Patch Update Multiple Vulnerabilities cve.report (archive)
text/html
URL Logo BID 91787
git.openssl.org Git - openssl.git/commit git.openssl.org
text/xml
URL Logo CONFIRM git.openssl.org/?p=openssl.git;a=commit;h=68595c0c2886e7942a14f98c17a55a88afb6c292
www.freebsd.org
text/plain
FREEBSD FreeBSD-SA-16:17
[security-announce] SUSE-SU-2016:1233-1: important: Security update for lists.opensuse.org
text/html
URL Logo SUSE SUSE-SU-2016:1233
Document Display | HPE Support Center h20566.www2.hpe.com
text/html
URL Logo CONFIRM h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05320149
[security-announce] SUSE-SU-2016:1206-1: important: Security update for lists.opensuse.org
text/html
URL Logo SUSE SUSE-SU-2016:1206
Broadcom Support Portal bto.bluecoat.com
text/html
URL Logo CONFIRM bto.bluecoat.com/security-advisory/sa123
On Web-Security and -Insecurity: Curious Padding oracle in OpenSSL (CVE-2016-2107) web-in-security.blogspot.ca
text/html
URL Logo MISC web-in-security.blogspot.ca/2016/05/curious-padding-oracle-in-openssl-cve.html
Oracle Critical Patch Update - January 2018 www.oracle.com
text/html
URL Logo CONFIRM www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html
CPU July 2018 web.archive.org
text/html
Inactive LinkNot Archived
URL Logo CONFIRM www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html
Document Display | HPE Support Center h20566.www2.hpe.com
text/html
URL Logo CONFIRM h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722
Yet Another Padding Oracle in OpenSSL CBC Ciphersuites blog.cloudflare.com
text/html
URL Logo MISC blog.cloudflare.com/yet-another-padding-oracle-in-openssl-cbc-ciphersuites/
Oracle Critical Patch Update - October 2016 www.oracle.com
text/html
URL Logo CONFIRM www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html
[security-announce] openSUSE-SU-2016:1240-1: important: Security update lists.opensuse.org
text/html
URL Logo SUSE openSUSE-SU-2016:1240
[R7] LCE 4.8.1 Fixes Multiple Vulnerabilities - Security Advisory | Tenable™ www.tenable.com
text/html
URL Logo CONFIRM www.tenable.com/security/tns-2016-18
[SECURITY] Fedora 22 Update: openssl-1.0.1k-15.fc22 lists.fedoraproject.org
text/html
URL Logo FEDORA FEDORA-2016-1e39d934ed
Oracle Linux Bulletin - April 2016 www.oracle.com
text/html
URL Logo CONFIRM www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html
Document Display | HPE Support Center h20566.www2.hpe.com
text/html
URL Logo CONFIRM h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03765en_us
[SECURITY] Fedora 23 Update: openssl-1.0.2h-1.fc23 lists.fedoraproject.org
text/html
URL Logo FEDORA FEDORA-2016-05c567df1a
Document Display | HPE Support Center h20566.www2.hpe.com
text/html
URL Logo CONFIRM h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05386804
OpenSSL: Multiple vulnerabilities (GLSA 201612-16) — Gentoo security security.gentoo.org
text/html
URL Logo GENTOO GLSA-201612-16
The Slackware Linux Project: Slackware Security Advisories www.slackware.com
text/html
URL Logo SLACKWARE SSA:2016-124-01
OpenSSL - Padding Oracle in AES-NI CBC MAC Check - Multiple dos Exploit www.exploit-db.com
Proof of Concept
text/html
URL Logo EXPLOIT-DB 39768
OpenSSL Multiple Bugs Let Remote Users Decrypt Data, Deny Service, Obtain Potentially Sensitive Information, and Potentially Execute Arbitrary Code - SecurityTracker www.securitytracker.com
text/html
URL Logo SECTRACK 1035721
Android Security Bulletin—July 2016 | Android Open Source Project source.android.com
text/html
URL Logo CONFIRM source.android.com/security/bulletin/2016-07-01.html
[security-announce] openSUSE-SU-2016:1243-1: important: Security update lists.opensuse.org
text/html
URL Logo SUSE openSUSE-SU-2016:1243
Red Hat Customer Portal web.archive.org
text/html
Inactive LinkNot Archived
URL Logo REDHAT RHSA-2016:0722
Red Hat Customer Portal web.archive.org
text/html
Inactive LinkNot Archived
URL Logo REDHAT RHSA-2016:0996
[security-announce] SUSE-SU-2016:1228-1: important: Security update for lists.opensuse.org
text/html
URL Logo SUSE SUSE-SU-2016:1228
Document Display | HPE Support Center h20566.www2.hpe.com
text/html
URL Logo CONFIRM h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03756en_us
Multiple Vulnerabilities in OpenSSL Affecting Cisco Products: May 2016 tools.cisco.com
text/html
URL Logo CISCO 20160504 Multiple Vulnerabilities in OpenSSL Affecting Cisco Products: May 2016
Red Hat Customer Portal web.archive.org
text/html
Inactive LinkNot Archived
URL Logo REDHAT RHSA-2016:2073
Vendor Advisory
www.openssl.org
text/plain
CONFIRM www.openssl.org/news/secadv/20160503.txt
[SECURITY] Fedora 24 Update: openssl-1.0.2h-1.fc24 lists.fedoraproject.org
text/html
URL Logo FEDORA FEDORA-2016-1411324654
Juniper Networks - 2016-10 Security Bulletin: OpenSSL security updates kb.juniper.net
text/html
URL Logo CONFIRM kb.juniper.net/InfoCenter/index?page=content&id=JSA10759
May 2016 OpenSSL Vulnerabilities in Multiple NetApp Products | NetApp Product Security security.netapp.com
text/html
URL Logo CONFIRM security.netapp.com/advisory/ntap-20160504-0001/
CPU Oct 2018 www.oracle.com
text/html
URL Logo CONFIRM www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html
Document Display | HPE Support Center h20566.www2.hpe.com
text/html
URL Logo CONFIRM h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbgn03728en_us
McAfee Security Bulletin: McAfee product updates fix vulnerabilities in OpenSSL that can allow an attacker to decrypt the traffic, corrupt the heap, and cause a denial of service kc.mcafee.com
text/html
URL Logo CONFIRM kc.mcafee.com/corporate/index?page=content&id=SB10160
Public KB - SA40202 - [Pulse Secure] May 3rd 2016 OpenSSL Security Advisory kb.pulsesecure.net
text/html
URL Logo CONFIRM kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA40202
Document Display | HPE Support Center h20566.www2.hpe.com
text/html
URL Logo CONFIRM h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05164862
Oracle Critical Patch Update - July 2017 www.oracle.com
text/html
URL Logo CONFIRM www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html
Oracle Critical Patch Update - October 2017 www.oracle.com
text/html
URL Logo CONFIRM www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
Citrix XenServer Multiple Security Updates support.citrix.com
text/html
URL Logo CONFIRM support.citrix.com/article/CTX212736
Red Hat Customer Portal web.archive.org
text/html
Inactive LinkNot Archived
URL Logo REDHAT RHSA-2016:2957
Debian -- Security Information -- DSA-3566-1 openssl www.debian.org
Depreciated Link
text/html
URL Logo DEBIAN DSA-3566

Exploit/POC from Github

Simple test for the May 2016 OpenSSL padding oracle (CVE-2016-2107)

Known Affected Configurations (CPE V2.3)

Type Vendor Product Version Update Edition Language
Operating
System
GoogleAndroid4.0AllAllAll
Operating
System
GoogleAndroid4.0.1AllAllAll
Operating
System
GoogleAndroid4.0.2AllAllAll
Operating
System
GoogleAndroid4.0.3AllAllAll
Operating
System
GoogleAndroid4.0.4AllAllAll
Operating
System
GoogleAndroid4.1AllAllAll
Operating
System
GoogleAndroid4.1.2AllAllAll
Operating
System
GoogleAndroid4.2AllAllAll
Operating
System
GoogleAndroid4.2.1AllAllAll
Operating
System
GoogleAndroid4.2.2AllAllAll
Operating
System
GoogleAndroid4.3AllAllAll
Operating
System
GoogleAndroid4.3.1AllAllAll
Operating
System
GoogleAndroid4.4AllAllAll
Operating
System
GoogleAndroid4.4.1AllAllAll
Operating
System
GoogleAndroid4.4.2AllAllAll
Operating
System
GoogleAndroid4.4.3AllAllAll
Operating
System
GoogleAndroid5.0AllAllAll
Operating
System
GoogleAndroid5.0.1AllAllAll
Operating
System
GoogleAndroid5.1AllAllAll
Operating
System
GoogleAndroid5.1.0AllAllAll
Operating
System
GoogleAndroid4.0AllAllAll
Operating
System
GoogleAndroid4.0.1AllAllAll
Operating
System
GoogleAndroid4.0.2AllAllAll
Operating
System
GoogleAndroid4.0.3AllAllAll
Operating
System
GoogleAndroid4.0.4AllAllAll
Operating
System
GoogleAndroid4.1AllAllAll
Operating
System
GoogleAndroid4.1.2AllAllAll
Operating
System
GoogleAndroid4.2AllAllAll
Operating
System
GoogleAndroid4.2.1AllAllAll
Operating
System
GoogleAndroid4.2.2AllAllAll
Operating
System
GoogleAndroid4.3AllAllAll
Operating
System
GoogleAndroid4.3.1AllAllAll
Operating
System
GoogleAndroid4.4AllAllAll
Operating
System
GoogleAndroid4.4.1AllAllAll
Operating
System
GoogleAndroid4.4.2AllAllAll
Operating
System
GoogleAndroid4.4.3AllAllAll
Operating
System
GoogleAndroid5.0AllAllAll
Operating
System
GoogleAndroid5.0.1AllAllAll
Operating
System
GoogleAndroid5.1AllAllAll
Operating
System
GoogleAndroid5.1.0AllAllAll
ApplicationHpHelion Openstack2.0AllAllAll
ApplicationHpHelion Openstack2.1AllAllAll
ApplicationHpHelion Openstack2.1.2AllAllAll
ApplicationHpHelion Openstack2.1.4AllAllAll
ApplicationHpHelion Openstack2.0AllAllAll
ApplicationHpHelion Openstack2.1AllAllAll
ApplicationHpHelion Openstack2.1.2AllAllAll
ApplicationHpHelion Openstack2.1.4AllAllAll
ApplicationOpensslOpenssl1.0.2AllAllAll
ApplicationOpensslOpenssl1.0.2beta1AllAll
ApplicationOpensslOpenssl1.0.2beta2AllAll
ApplicationOpensslOpenssl1.0.2beta3AllAll
ApplicationOpensslOpenssl1.0.2aAllAllAll
ApplicationOpensslOpenssl1.0.2bAllAllAll
ApplicationOpensslOpenssl1.0.2cAllAllAll
ApplicationOpensslOpenssl1.0.2dAllAllAll
ApplicationOpensslOpenssl1.0.2eAllAllAll
ApplicationOpensslOpenssl1.0.2fAllAllAll
ApplicationOpensslOpenssl1.0.2gAllAllAll
ApplicationOpensslOpenssl1.0.2AllAllAll
ApplicationOpensslOpenssl1.0.2beta1AllAll
ApplicationOpensslOpenssl1.0.2beta2AllAll
ApplicationOpensslOpenssl1.0.2beta3AllAll
ApplicationOpensslOpenssl1.0.2aAllAllAll
ApplicationOpensslOpenssl1.0.2bAllAllAll
ApplicationOpensslOpenssl1.0.2cAllAllAll
ApplicationOpensslOpenssl1.0.2dAllAllAll
ApplicationOpensslOpenssl1.0.2eAllAllAll
ApplicationOpensslOpenssl1.0.2fAllAllAll
ApplicationOpensslOpenssl1.0.2gAllAllAll
ApplicationOpensslOpensslAllAllAllAll
Operating
System
OpensuseLeap42.1AllAllAll
Operating
System
OpensuseLeap42.1AllAllAll
Operating
System
OpensuseOpensuse13.2AllAllAll
Operating
System
OpensuseOpensuse13.2AllAllAll
Operating
System
RedhatEnterprise Linux Desktop6.0AllAllAll
Operating
System
RedhatEnterprise Linux Desktop7.0AllAllAll
Operating
System
RedhatEnterprise Linux Desktop6.0AllAllAll
Operating
System
RedhatEnterprise Linux Desktop7.0AllAllAll
Operating
System
RedhatEnterprise Linux Hpc Node6.0AllAllAll
Operating
System
RedhatEnterprise Linux Hpc Node7.0AllAllAll
Operating
System
RedhatEnterprise Linux Hpc Node6.0AllAllAll
Operating
System
RedhatEnterprise Linux Hpc Node7.0AllAllAll
Operating
System
RedhatEnterprise Linux Hpc Node Eus7.2AllAllAll
Operating
System
RedhatEnterprise Linux Hpc Node Eus7.2AllAllAll
Operating
System
RedhatEnterprise Linux Server6.0AllAllAll
Operating
System
RedhatEnterprise Linux Server7.0AllAllAll
Operating
System
RedhatEnterprise Linux Server6.0AllAllAll
Operating
System
RedhatEnterprise Linux Server7.0AllAllAll
Operating
System
RedhatEnterprise Linux Server Aus7.2AllAllAll
Operating
System
RedhatEnterprise Linux Server Aus7.2AllAllAll
Operating
System
RedhatEnterprise Linux Server Eus7.2AllAllAll
Operating
System
RedhatEnterprise Linux Server Eus7.2AllAllAll
Operating
System
RedhatEnterprise Linux Workstation6.0AllAllAll
Operating
System
RedhatEnterprise Linux Workstation7.0AllAllAll
Operating
System
RedhatEnterprise Linux Workstation6.0AllAllAll
Operating
System
RedhatEnterprise Linux Workstation7.0AllAllAll
  • cpe:2.3:o:google:android:4.0:*:*:*:*:*:*:*:
  • cpe:2.3:o:google:android:4.0.1:*:*:*:*:*:*:*:
  • cpe:2.3:o:google:android:4.0.2:*:*:*:*:*:*:*:
  • cpe:2.3:o:google:android:4.0.3:*:*:*:*:*:*:*:
  • cpe:2.3:o:google:android:4.0.4:*:*:*:*:*:*:*:
  • cpe:2.3:o:google:android:4.1:*:*:*:*:*:*:*:
  • cpe:2.3:o:google:android:4.1.2:*:*:*:*:*:*:*:
  • cpe:2.3:o:google:android:4.2:*:*:*:*:*:*:*:
  • cpe:2.3:o:google:android:4.2.1:*:*:*:*:*:*:*:
  • cpe:2.3:o:google:android:4.2.2:*:*:*:*:*:*:*:
  • cpe:2.3:o:google:android:4.3:*:*:*:*:*:*:*:
  • cpe:2.3:o:google:android:4.3.1:*:*:*:*:*:*:*:
  • cpe:2.3:o:google:android:4.4:*:*:*:*:*:*:*:
  • cpe:2.3:o:google:android:4.4.1:*:*:*:*:*:*:*:
  • cpe:2.3:o:google:android:4.4.2:*:*:*:*:*:*:*:
  • cpe:2.3:o:google:android:4.4.3:*:*:*:*:*:*:*:
  • cpe:2.3:o:google:android:5.0:*:*:*:*:*:*:*:
  • cpe:2.3:o:google:android:5.0.1:*:*:*:*:*:*:*:
  • cpe:2.3:o:google:android:5.1:*:*:*:*:*:*:*:
  • cpe:2.3:o:google:android:5.1.0:*:*:*:*:*:*:*:
  • cpe:2.3:o:google:android:4.0:*:*:*:*:*:*:*:
  • cpe:2.3:o:google:android:4.0.1:*:*:*:*:*:*:*:
  • cpe:2.3:o:google:android:4.0.2:*:*:*:*:*:*:*:
  • cpe:2.3:o:google:android:4.0.3:*:*:*:*:*:*:*:
  • cpe:2.3:o:google:android:4.0.4:*:*:*:*:*:*:*:
  • cpe:2.3:o:google:android:4.1:*:*:*:*:*:*:*:
  • cpe:2.3:o:google:android:4.1.2:*:*:*:*:*:*:*:
  • cpe:2.3:o:google:android:4.2:*:*:*:*:*:*:*:
  • cpe:2.3:o:google:android:4.2.1:*:*:*:*:*:*:*:
  • cpe:2.3:o:google:android:4.2.2:*:*:*:*:*:*:*:
  • cpe:2.3:o:google:android:4.3:*:*:*:*:*:*:*:
  • cpe:2.3:o:google:android:4.3.1:*:*:*:*:*:*:*:
  • cpe:2.3:o:google:android:4.4:*:*:*:*:*:*:*:
  • cpe:2.3:o:google:android:4.4.1:*:*:*:*:*:*:*:
  • cpe:2.3:o:google:android:4.4.2:*:*:*:*:*:*:*:
  • cpe:2.3:o:google:android:4.4.3:*:*:*:*:*:*:*:
  • cpe:2.3:o:google:android:5.0:*:*:*:*:*:*:*:
  • cpe:2.3:o:google:android:5.0.1:*:*:*:*:*:*:*:
  • cpe:2.3:o:google:android:5.1:*:*:*:*:*:*:*:
  • cpe:2.3:o:google:android:5.1.0:*:*:*:*:*:*:*:
  • cpe:2.3:a:hp:helion_openstack:2.0:*:*:*:*:*:*:*:
  • cpe:2.3:a:hp:helion_openstack:2.1:*:*:*:*:*:*:*:
  • cpe:2.3:a:hp:helion_openstack:2.1.2:*:*:*:*:*:*:*:
  • cpe:2.3:a:hp:helion_openstack:2.1.4:*:*:*:*:*:*:*:
  • cpe:2.3:a:hp:helion_openstack:2.0:*:*:*:*:*:*:*:
  • cpe:2.3:a:hp:helion_openstack:2.1:*:*:*:*:*:*:*:
  • cpe:2.3:a:hp:helion_openstack:2.1.2:*:*:*:*:*:*:*:
  • cpe:2.3:a:hp:helion_openstack:2.1.4:*:*:*:*:*:*:*:
  • cpe:2.3:a:openssl:openssl:1.0.2:*:*:*:*:*:*:*:
  • cpe:2.3:a:openssl:openssl:1.0.2:beta1:*:*:*:*:*:*:
  • cpe:2.3:a:openssl:openssl:1.0.2:beta2:*:*:*:*:*:*:
  • cpe:2.3:a:openssl:openssl:1.0.2:beta3:*:*:*:*:*:*:
  • cpe:2.3:a:openssl:openssl:1.0.2a:*:*:*:*:*:*:*:
  • cpe:2.3:a:openssl:openssl:1.0.2b:*:*:*:*:*:*:*:
  • cpe:2.3:a:openssl:openssl:1.0.2c:*:*:*:*:*:*:*:
  • cpe:2.3:a:openssl:openssl:1.0.2d:*:*:*:*:*:*:*:
  • cpe:2.3:a:openssl:openssl:1.0.2e:*:*:*:*:*:*:*:
  • cpe:2.3:a:openssl:openssl:1.0.2f:*:*:*:*:*:*:*:
  • cpe:2.3:a:openssl:openssl:1.0.2g:*:*:*:*:*:*:*:
  • cpe:2.3:a:openssl:openssl:1.0.2:*:*:*:*:*:*:*:
  • cpe:2.3:a:openssl:openssl:1.0.2:beta1:*:*:*:*:*:*:
  • cpe:2.3:a:openssl:openssl:1.0.2:beta2:*:*:*:*:*:*:
  • cpe:2.3:a:openssl:openssl:1.0.2:beta3:*:*:*:*:*:*:
  • cpe:2.3:a:openssl:openssl:1.0.2a:*:*:*:*:*:*:*:
  • cpe:2.3:a:openssl:openssl:1.0.2b:*:*:*:*:*:*:*:
  • cpe:2.3:a:openssl:openssl:1.0.2c:*:*:*:*:*:*:*:
  • cpe:2.3:a:openssl:openssl:1.0.2d:*:*:*:*:*:*:*:
  • cpe:2.3:a:openssl:openssl:1.0.2e:*:*:*:*:*:*:*:
  • cpe:2.3:a:openssl:openssl:1.0.2f:*:*:*:*:*:*:*:
  • cpe:2.3:a:openssl:openssl:1.0.2g:*:*:*:*:*:*:*:
  • cpe:2.3:a:openssl:openssl:*:*:*:*:*:*:*:*:
  • cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*:
  • cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*:
  • cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*:
  • cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*:
  • cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*:
  • cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*:
  • cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*:
  • cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*:
  • cpe:2.3:o:redhat:enterprise_linux_hpc_node:6.0:*:*:*:*:*:*:*:
  • cpe:2.3:o:redhat:enterprise_linux_hpc_node:7.0:*:*:*:*:*:*:*:
  • cpe:2.3:o:redhat:enterprise_linux_hpc_node:6.0:*:*:*:*:*:*:*:
  • cpe:2.3:o:redhat:enterprise_linux_hpc_node:7.0:*:*:*:*:*:*:*:
  • cpe:2.3:o:redhat:enterprise_linux_hpc_node_eus:7.2:*:*:*:*:*:*:*:
  • cpe:2.3:o:redhat:enterprise_linux_hpc_node_eus:7.2:*:*:*:*:*:*:*:
  • cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*:
  • cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*:
  • cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*:
  • cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*:
  • cpe:2.3:o:redhat:enterprise_linux_server_aus:7.2:*:*:*:*:*:*:*:
  • cpe:2.3:o:redhat:enterprise_linux_server_aus:7.2:*:*:*:*:*:*:*:
  • cpe:2.3:o:redhat:enterprise_linux_server_eus:7.2:*:*:*:*:*:*:*:
  • cpe:2.3:o:redhat:enterprise_linux_server_eus:7.2:*:*:*:*:*:*:*:
  • cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*:
  • cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*:
  • cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*:
  • cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*: