mirror of
https://github.com/0xMarcio/cve.git
synced 2026-05-09 15:15:46 +02:00
72 lines
3.8 KiB
Markdown
72 lines
3.8 KiB
Markdown
### [CVE-2016-2183](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2183)
|
|

|
|

|
|

|
|
|
|
### Description
|
|
|
|
The DES and Triple DES ciphers, as used in the TLS, SSH, and IPSec protocols and other protocols and products, have a birthday bound of approximately four billion blocks, which makes it easier for remote attackers to obtain cleartext data via a birthday attack against a long-duration encrypted session, as demonstrated by an HTTPS session using Triple DES in CBC mode, aka a "Sweet32" attack.
|
|
|
|
### POC
|
|
|
|
#### Reference
|
|
- http://packetstormsecurity.com/files/142756/IBM-Informix-Dynamic-Server-DLL-Injection-Code-Execution.html
|
|
- http://seclists.org/fulldisclosure/2017/Jul/31
|
|
- http://seclists.org/fulldisclosure/2017/May/105
|
|
- http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html
|
|
- http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html
|
|
- http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html
|
|
- http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
|
|
- http://www.oracle.com/technetwork/topics/security/ovmbulletinoct2016-3090547.html
|
|
- https://access.redhat.com/articles/2548661
|
|
- https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbgn03765en_us
|
|
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05356388
|
|
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722
|
|
- https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA40312
|
|
- https://kc.mcafee.com/corporate/index?page=content&id=SB10197
|
|
- https://nakedsecurity.sophos.com/2016/08/25/anatomy-of-a-cryptographic-collision-the-sweet32-attack/
|
|
- https://sweet32.info/
|
|
- https://www.exploit-db.com/exploits/42091/
|
|
- https://www.oracle.com/security-alerts/cpuapr2020.html
|
|
- https://www.oracle.com/security-alerts/cpujan2020.html
|
|
- https://www.oracle.com/security-alerts/cpujul2020.html
|
|
- https://www.oracle.com/security-alerts/cpuoct2020.html
|
|
- https://www.oracle.com/security-alerts/cpuoct2021.html
|
|
- https://www.tenable.com/security/tns-2016-20
|
|
|
|
#### Github
|
|
- https://github.com/ARPSyndicate/cvemon
|
|
- https://github.com/Artem-Salnikov/devops-netology
|
|
- https://github.com/Artem-Tvr/sysadmin-09-security
|
|
- https://github.com/Justic-D/Dev_net_home_1
|
|
- https://github.com/Kapotov/3.9.1
|
|
- https://github.com/Live-Hack-CVE/CVE-2016-2183
|
|
- https://github.com/ShAdowExEc/Nmap-based-batch-vulnerability-scanning
|
|
- https://github.com/Vainoord/devops-netology
|
|
- https://github.com/Valdem88/dev-17_ib-yakovlev_vs
|
|
- https://github.com/Vladislav-Pugachev/netology-DevOps-dz_-14
|
|
- https://github.com/WiktorMysz/devops-netology
|
|
- https://github.com/alexandrburyakov/Rep2
|
|
- https://github.com/alexgro1982/devops-netology
|
|
- https://github.com/aous-al-salek/crypto
|
|
- https://github.com/biswajitde/dsm_ips
|
|
- https://github.com/bysart/devops-netology
|
|
- https://github.com/catsploit/catsploit
|
|
- https://github.com/dmitrii1312/03-sysadmin-09
|
|
- https://github.com/gabrieljcs/ips-assessment-reports
|
|
- https://github.com/geon071/netolofy_12
|
|
- https://github.com/ilya-starchikov/devops-netology
|
|
- https://github.com/jeffaizenbr/Cipher-TLS-removing-vulnerabilities-from-openvas
|
|
- https://github.com/kampfcl3/lineBOT
|
|
- https://github.com/kthy/desmos
|
|
- https://github.com/mikemackintosh/ruby-qualys
|
|
- https://github.com/nikolay480/devops-netology
|
|
- https://github.com/odolezal/D-Link-DIR-655
|
|
- https://github.com/pashicop/3.9_1
|
|
- https://github.com/stanmay77/security
|
|
- https://github.com/tanjiti/sec_profile
|
|
- https://github.com/vitaliivakhr/NETOLOGY
|
|
- https://github.com/yellownine/netology-DevOps
|
|
- https://github.com/yurkao/python-ssl-deprecated
|
|
|