{"id":151,"date":"2016-05-10T04:27:36","date_gmt":"2016-05-10T04:27:36","guid":{"rendered":"http:\/\/www.urolime.com\/blogs\/?p=151"},"modified":"2016-06-27T15:08:27","modified_gmt":"2016-06-27T15:08:27","slug":"openssl-vulnerabilities-cve-2016-2108","status":"publish","type":"post","link":"https:\/\/www.urolime.com\/blogs\/openssl-vulnerabilities-cve-2016-2108\/","title":{"rendered":"OpenSSL Vulnerabilities fix \u2013  CVE-2016-2108"},"content":{"rendered":"<h2>OPENSSL VULNERABILITIES \u2013 CVE-2016-2108 &amp; CVE-2016-2107<\/h2>\n<p><span style=\"font-family: tahoma, arial, helvetica, sans-serif;\">On 3rd May 2016, <a href=\"https:\/\/www.openssl.org\/news\/secadv\/20160503.txt\">OpenSSL released patches<\/a> for two high severity bugs (<strong>CVE-2016-2108 &amp;\u00a0<strong>CVE-2016-2107)<\/strong><\/strong>, and 4 low severity ones.\u00a0<\/span><\/p>\n<p><span style=\"font-family: tahoma, arial, helvetica, sans-serif;\"><strong>CVE-2016-2107<\/strong> is an OpenSSL bug which allows a man-in-the-middle (MITM) attacker to use a padding oracle attack to decrypt traffic when the connection uses an AES CBC cipher and the server support AES-NI.<\/span><\/p>\n<p><span style=\"font-family: tahoma, arial, helvetica, sans-serif;\"><strong>CVE-2016-2108<\/strong> is a bug on OpenSSL&#8217;s ASN.1 encoder which allows attackers to trigger an out-of-bounds write, causing memory corruption that is potentially exploitable with some malloc implementations.<\/span><\/p>\n<p><span style=\"font-family: tahoma, arial, helvetica, sans-serif;\">These vulnerabilities affects most of the Linux operating systems such as Ubuntu, CentOS and Debian, since OpenSSL is included as a default package on the operating systems. If you are running vulnerable OS, we strongly recommend you to install the latest patches for your operating system to fix the vulnerability issue on your server.\u00a0<\/span><\/p>\n<p><span style=\"font-family: tahoma, arial, helvetica, sans-serif;\"><strong>OpenSSL Vulnerable Operating Systems<\/strong><\/span><\/p>\n<p><span style=\"font-family: tahoma, arial, helvetica, sans-serif;\">A security issue affects these releases:<\/span><\/p>\n<ul>\n<li>Ubuntu 16.04 LTS<\/li>\n<li>Ubuntu 15.10<\/li>\n<li>Ubuntu 14.04 LTS<\/li>\n<li>Ubuntu 12.04 LTS<\/li>\n<li>Redhat Enterprise Linux 5<\/li>\n<li>Redhat Enterprise Linux 6<\/li>\n<li>Redhat Enterprise Linux 7<\/li>\n<li>CentOS 6<\/li>\n<li>CentOS 7<\/li>\n<li>Amazon Linux<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<p><span style=\"font-family: tahoma, arial, helvetica, sans-serif;\"><strong>How to Fix the Problem<\/strong><\/span><\/p>\n<p>You just need to install the latest patches for your operating system, and restart your server afterwards for the new patches to take effect.<\/p>\n<p><span style=\"font-family: tahoma, arial, helvetica, sans-serif;\"><strong>On Ubuntu and Debian Systems:<\/strong><\/span><\/p>\n<blockquote><p><span style=\"font-family: tahoma, arial, helvetica, sans-serif;\"># sudo apt-get update<\/span><br \/>\n<span style=\"font-family: tahoma, arial, helvetica, sans-serif;\"># sudo apt-get\u00a0install libssl1.0.0 (or)\u00a0apt-get install &#8211;only-upgrade libssl1.0.0<\/span><\/p>\n<p><span style=\"font-family: tahoma, arial, helvetica, sans-serif;\">You can verify if the OpenSSL vulnerabilities are patched by using the below command:<\/span><\/p>\n<p><span style=\"font-family: tahoma, arial, helvetica, sans-serif;\"># sudo apt-get changelog libssl1.0.0 | egrep -i &#8220;(CVE-2016-2107|CVE-2016-2108)&#8221;<\/span><\/p>\n<p><span style=\"font-family: tahoma, arial, helvetica, sans-serif;\">and then reboot the system.<\/span><\/p><\/blockquote>\n<p><span style=\"font-family: tahoma, arial, helvetica, sans-serif;\"><strong>On RedHat\/CentOS Systems:<\/strong><\/span><\/p>\n<p>RedHat released the updates for\u00a0CVE-2016-2105 CVE-2016-2107 CVE-2016-2108 CVE-2016-2109 and CVE-2016-2176 , In this CVE-2016-2108 is the critical one and you can fix this issue by Openssl update.<\/p>\n<p>Red Hat Enterprise Linux 7 openssl-1.0.1e-51.el7_2.5 -&gt; Released<br \/>\nRed Hat Enterprise Linux 7 openssl098e\u00a0-&gt;\u00a0Will not fix<br \/>\nRed Hat Enterprise Linux 6 openssl-1.0.1e-48.el6_8.1 -&gt; Released<br \/>\nRed Hat Enterprise Linux 6 openssl098e -&gt; Will not fix<br \/>\nRed Hat Enterprise Linux 5 openssl-0.9.8e-40.el5_11 -&gt; Released<br \/>\nRed Hat Enterprise Linux 5 openssl097a -&gt; Will not fix<\/p>\n<p>RedHat security team is still working on\u00a0CVE-2016-2106 fix for\u00a0RHEL7\/6\u00a0openssl098e version.<\/p>\n<p><span style=\"font-family: tahoma, arial, helvetica, sans-serif;\"><a href=\"https:\/\/lists.centos.org\/pipermail\/centos-announce\/2016-May\/021860.html\" target=\"_blank\">CentOS announced<\/a> the availability of patched OpenSSL packages in its repositories. The version number is\u00a0<strong>openssl-1.0.1e-51.el7_2.5<\/strong>.<\/span><\/p>\n<blockquote><p><span style=\"font-family: tahoma, arial, helvetica, sans-serif;\"># yum info openssl<\/span><br \/>\n<span style=\"font-family: tahoma, arial, helvetica, sans-serif;\"># yum update openssl<\/span><br \/>\n<span style=\"font-family: tahoma, arial, helvetica, sans-serif;\">and then reboot the system.<\/span><\/p><\/blockquote>\n<p><span style=\"font-family: tahoma, arial, helvetica, sans-serif;\">Please note that RedHat WILL NOT release a patch for discontinued server versions such as RHEL 4. For more details check <a href=\"https:\/\/access.redhat.com\/security\/cve\/CVE-2016-2108\" target=\"_blank\">RedHat security portal here<\/a>.<\/span><\/p>\n<p>You can verify if the OpenSSL vulnerabilities are patched by using the below command:<\/p>\n<blockquote><p>#\u00a0rpm -q &#8211;changelog | egrep -i &#8220;(CVE-2016-2107|CVE-2016-2108)&#8221;<\/p><\/blockquote>\n<p><span style=\"font-family: tahoma, arial, helvetica, sans-serif;\"><strong>On AWS Linux Systems:<\/strong><\/span><\/p>\n<blockquote><p><span style=\"font-family: tahoma, arial, helvetica, sans-serif;\"># yum info openssl<\/span><br \/>\n<span style=\"font-family: tahoma, arial, helvetica, sans-serif;\"># yum update openssl<\/span><br \/>\n<span style=\"font-family: tahoma, arial, helvetica, sans-serif;\">and then reboot the system.<\/span><\/p><\/blockquote>\n<p><span style=\"font-family: tahoma, arial, helvetica, sans-serif;\">If you do not see new OpenSSL packages listed, your update setting may not be correct, or your OS version may no longer be supported.\u00a0If your OS version is not listed to be fixed,\u00a0you may have to custom patch the server from OpenSSL source. You\u2019ll need OpenSSL versions\u00a01.0.2h or\u00a01.0.1t, depending on which current version of OpenSSL you use.<\/span><\/p>\n<p><span style=\"font-family: tahoma, arial, helvetica, sans-serif;\"><strong>More information about\u00a0<strong>CVE-2016-2108 &amp;\u00a0<strong>CVE-2016-2107<\/strong><\/strong><\/strong><\/span><\/p>\n<p><span style=\"font-family: tahoma, arial, helvetica, sans-serif;\"><a href=\"https:\/\/www.openssl.org\/news\/secadv\/20160503.txt\" target=\"_blank\">OpenSSL Security Advisory<\/a><\/span><br \/>\n<span style=\"font-family: tahoma, arial, helvetica, sans-serif;\"><a href=\"http:\/\/www.ubuntu.com\/usn\/usn-2959-1\/\" target=\"_blank\">USN-2959-1: OpenSSL vulnerabilities<\/a><\/span><\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<div class=\"pvc_clear\"><\/div>\n<p id=\"pvc_stats_151\" class=\"pvc_stats all  \" data-element-id=\"151\" style=\"\"><i class=\"pvc-stats-icon medium\" aria-hidden=\"true\"><svg aria-hidden=\"true\" focusable=\"false\" data-prefix=\"far\" data-icon=\"chart-bar\" role=\"img\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 512 512\" class=\"svg-inline--fa fa-chart-bar fa-w-16 fa-2x\"><path fill=\"currentColor\" d=\"M396.8 352h22.4c6.4 0 12.8-6.4 12.8-12.8V108.8c0-6.4-6.4-12.8-12.8-12.8h-22.4c-6.4 0-12.8 6.4-12.8 12.8v230.4c0 6.4 6.4 12.8 12.8 12.8zm-192 0h22.4c6.4 0 12.8-6.4 12.8-12.8V140.8c0-6.4-6.4-12.8-12.8-12.8h-22.4c-6.4 0-12.8 6.4-12.8 12.8v198.4c0 6.4 6.4 12.8 12.8 12.8zm96 0h22.4c6.4 0 12.8-6.4 12.8-12.8V204.8c0-6.4-6.4-12.8-12.8-12.8h-22.4c-6.4 0-12.8 6.4-12.8 12.8v134.4c0 6.4 6.4 12.8 12.8 12.8zM496 400H48V80c0-8.84-7.16-16-16-16H16C7.16 64 0 71.16 0 80v336c0 17.67 14.33 32 32 32h464c8.84 0 16-7.16 16-16v-16c0-8.84-7.16-16-16-16zm-387.2-48h22.4c6.4 0 12.8-6.4 12.8-12.8v-70.4c0-6.4-6.4-12.8-12.8-12.8h-22.4c-6.4 0-12.8 6.4-12.8 12.8v70.4c0 6.4 6.4 12.8 12.8 12.8z\" class=\"\"><\/path><\/svg><\/i> <img loading=\"lazy\" decoding=\"async\" width=\"16\" height=\"16\" alt=\"Loading\" src=\"https:\/\/www.urolime.com\/blogs\/wp-content\/plugins\/page-views-count\/ajax-loader-2x.gif\" border=0 \/><\/p>\n<div class=\"pvc_clear\"><\/div>\n","protected":false},"excerpt":{"rendered":"<p>OPENSSL VULNERABILITIES \u2013 CVE-2016-2108 &amp; CVE-2016-2107 On 3rd May 2016, OpenSSL released patches for two high severity bugs (CVE-2016-2108 &amp;\u00a0CVE-2016-2107), and 4 low severity ones.\u00a0 CVE-2016-2107 is an OpenSSL bug which allows a man-in-the-middle (MITM) attacker to use a padding oracle attack to decrypt traffic when the connection uses an AES CBC cipher and the [&hellip;]<\/p>\n<div class=\"pvc_clear\"><\/div>\n<p id=\"pvc_stats_151\" class=\"pvc_stats all  \" data-element-id=\"151\" style=\"\"><i class=\"pvc-stats-icon medium\" aria-hidden=\"true\"><svg aria-hidden=\"true\" focusable=\"false\" data-prefix=\"far\" data-icon=\"chart-bar\" role=\"img\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 512 512\" class=\"svg-inline--fa fa-chart-bar fa-w-16 fa-2x\"><path fill=\"currentColor\" d=\"M396.8 352h22.4c6.4 0 12.8-6.4 12.8-12.8V108.8c0-6.4-6.4-12.8-12.8-12.8h-22.4c-6.4 0-12.8 6.4-12.8 12.8v230.4c0 6.4 6.4 12.8 12.8 12.8zm-192 0h22.4c6.4 0 12.8-6.4 12.8-12.8V140.8c0-6.4-6.4-12.8-12.8-12.8h-22.4c-6.4 0-12.8 6.4-12.8 12.8v198.4c0 6.4 6.4 12.8 12.8 12.8zm96 0h22.4c6.4 0 12.8-6.4 12.8-12.8V204.8c0-6.4-6.4-12.8-12.8-12.8h-22.4c-6.4 0-12.8 6.4-12.8 12.8v134.4c0 6.4 6.4 12.8 12.8 12.8zM496 400H48V80c0-8.84-7.16-16-16-16H16C7.16 64 0 71.16 0 80v336c0 17.67 14.33 32 32 32h464c8.84 0 16-7.16 16-16v-16c0-8.84-7.16-16-16-16zm-387.2-48h22.4c6.4 0 12.8-6.4 12.8-12.8v-70.4c0-6.4-6.4-12.8-12.8-12.8h-22.4c-6.4 0-12.8 6.4-12.8 12.8v70.4c0 6.4 6.4 12.8 12.8 12.8z\" class=\"\"><\/path><\/svg><\/i> <img loading=\"lazy\" decoding=\"async\" width=\"16\" height=\"16\" alt=\"Loading\" src=\"https:\/\/www.urolime.com\/blogs\/wp-content\/plugins\/page-views-count\/ajax-loader-2x.gif\" border=0 \/><\/p>\n<div class=\"pvc_clear\"><\/div>\n","protected":false},"author":1,"featured_media":161,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"content-type":"","sfsi_plus_gutenberg_text_before_share":"","sfsi_plus_gutenberg_show_text_before_share":"","sfsi_plus_gutenberg_icon_type":"","sfsi_plus_gutenberg_icon_alignemt":"","sfsi_plus_gutenburg_max_per_row":"","rop_custom_images_group":[],"rop_custom_messages_group":[],"rop_publish_now":"initial","rop_publish_now_accounts":[],"rop_publish_now_history":[],"rop_publish_now_status":"pending","footnotes":""},"categories":[1],"tags":[],"class_list":["post-151","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-general"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.3.1 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>OpenSSL Vulnerabilities fix \u2013 CVE-2016-2108 - Urolime Blogs<\/title>\n<meta name=\"description\" content=\"OPENSSL VULNERABILITIES \u2013 CVE-2016-2108 &amp; CVE-2016-2107\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.urolime.com\/blogs\/openssl-vulnerabilities-cve-2016-2108\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"OpenSSL Vulnerabilities fix \u2013 CVE-2016-2108 - Urolime Blogs\" \/>\n<meta property=\"og:description\" content=\"OPENSSL VULNERABILITIES \u2013 CVE-2016-2108 &amp; CVE-2016-2107\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.urolime.com\/blogs\/openssl-vulnerabilities-cve-2016-2108\/\" \/>\n<meta property=\"og:site_name\" content=\"Urolime Blogs\" \/>\n<meta property=\"article:published_time\" content=\"2016-05-10T04:27:36+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2016-06-27T15:08:27+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.urolime.com\/blogs\/wp-content\/uploads\/2016\/05\/openssl_cracked.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"834\" \/>\n\t<meta property=\"og:image:height\" content=\"561\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Urolime Technologies\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Urolime Technologies\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.urolime.com\/blogs\/openssl-vulnerabilities-cve-2016-2108\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.urolime.com\/blogs\/openssl-vulnerabilities-cve-2016-2108\/\"},\"author\":{\"name\":\"Urolime Technologies\",\"@id\":\"https:\/\/www.urolime.com\/blogs\/#\/schema\/person\/c231f59d5f2c2516e0efc6067ee0c22c\"},\"headline\":\"OpenSSL Vulnerabilities fix \u2013 CVE-2016-2108\",\"datePublished\":\"2016-05-10T04:27:36+00:00\",\"dateModified\":\"2016-06-27T15:08:27+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.urolime.com\/blogs\/openssl-vulnerabilities-cve-2016-2108\/\"},\"wordCount\":540,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.urolime.com\/blogs\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.urolime.com\/blogs\/openssl-vulnerabilities-cve-2016-2108\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.urolime.com\/blogs\/wp-content\/uploads\/2016\/05\/openssl_cracked.jpg\",\"articleSection\":[\"General\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.urolime.com\/blogs\/openssl-vulnerabilities-cve-2016-2108\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.urolime.com\/blogs\/openssl-vulnerabilities-cve-2016-2108\/\",\"url\":\"https:\/\/www.urolime.com\/blogs\/openssl-vulnerabilities-cve-2016-2108\/\",\"name\":\"OpenSSL Vulnerabilities fix \u2013 CVE-2016-2108 - Urolime Blogs\",\"isPartOf\":{\"@id\":\"https:\/\/www.urolime.com\/blogs\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.urolime.com\/blogs\/openssl-vulnerabilities-cve-2016-2108\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.urolime.com\/blogs\/openssl-vulnerabilities-cve-2016-2108\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.urolime.com\/blogs\/wp-content\/uploads\/2016\/05\/openssl_cracked.jpg\",\"datePublished\":\"2016-05-10T04:27:36+00:00\",\"dateModified\":\"2016-06-27T15:08:27+00:00\",\"description\":\"OPENSSL VULNERABILITIES \u2013 CVE-2016-2108 & CVE-2016-2107\",\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.urolime.com\/blogs\/openssl-vulnerabilities-cve-2016-2108\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.urolime.com\/blogs\/openssl-vulnerabilities-cve-2016-2108\/#primaryimage\",\"url\":\"https:\/\/www.urolime.com\/blogs\/wp-content\/uploads\/2016\/05\/openssl_cracked.jpg\",\"contentUrl\":\"https:\/\/www.urolime.com\/blogs\/wp-content\/uploads\/2016\/05\/openssl_cracked.jpg\",\"width\":834,\"height\":561,\"caption\":\"openssl cracked\"},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.urolime.com\/blogs\/#website\",\"url\":\"https:\/\/www.urolime.com\/blogs\/\",\"name\":\"Urolime Blogs\",\"description\":\"The place for DevOps, Cloud, Kubernetes News and Updates\",\"publisher\":{\"@id\":\"https:\/\/www.urolime.com\/blogs\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.urolime.com\/blogs\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.urolime.com\/blogs\/#organization\",\"name\":\"Urolime Blogs\",\"url\":\"https:\/\/www.urolime.com\/blogs\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.urolime.com\/blogs\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.urolime.com\/blogs\/wp-content\/uploads\/2021\/06\/cropped-250-x250.jpg\",\"contentUrl\":\"https:\/\/www.urolime.com\/blogs\/wp-content\/uploads\/2021\/06\/cropped-250-x250.jpg\",\"width\":250,\"height\":73,\"caption\":\"Urolime Blogs\"},\"image\":{\"@id\":\"https:\/\/www.urolime.com\/blogs\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.urolime.com\/blogs\/#\/schema\/person\/c231f59d5f2c2516e0efc6067ee0c22c\",\"name\":\"Urolime Technologies\",\"description\":\"Urolime Technologies has made groundbreaking accomplishments in the field of Google Cloud &amp; Kubernetes Consulting, DevOps Services, 24\/7 Managed Services &amp; Support, Dedicated IT Team, Managed AWS Consulting and Azure Cloud Consulting. We believe our customers are Smart to choose their IT Partner, and we \u201cDo IT Smart\u201d.\",\"sameAs\":[\"https:\/\/www.urolime.com\/\"],\"url\":\"https:\/\/www.urolime.com\/blogs\/author\/blogadmin\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"OpenSSL Vulnerabilities fix \u2013 CVE-2016-2108 - Urolime Blogs","description":"OPENSSL VULNERABILITIES \u2013 CVE-2016-2108 & CVE-2016-2107","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.urolime.com\/blogs\/openssl-vulnerabilities-cve-2016-2108\/","og_locale":"en_US","og_type":"article","og_title":"OpenSSL Vulnerabilities fix \u2013 CVE-2016-2108 - Urolime Blogs","og_description":"OPENSSL VULNERABILITIES \u2013 CVE-2016-2108 & CVE-2016-2107","og_url":"https:\/\/www.urolime.com\/blogs\/openssl-vulnerabilities-cve-2016-2108\/","og_site_name":"Urolime Blogs","article_published_time":"2016-05-10T04:27:36+00:00","article_modified_time":"2016-06-27T15:08:27+00:00","og_image":[{"width":834,"height":561,"url":"https:\/\/www.urolime.com\/blogs\/wp-content\/uploads\/2016\/05\/openssl_cracked.jpg","type":"image\/jpeg"}],"author":"Urolime Technologies","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Urolime Technologies","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.urolime.com\/blogs\/openssl-vulnerabilities-cve-2016-2108\/#article","isPartOf":{"@id":"https:\/\/www.urolime.com\/blogs\/openssl-vulnerabilities-cve-2016-2108\/"},"author":{"name":"Urolime Technologies","@id":"https:\/\/www.urolime.com\/blogs\/#\/schema\/person\/c231f59d5f2c2516e0efc6067ee0c22c"},"headline":"OpenSSL Vulnerabilities fix \u2013 CVE-2016-2108","datePublished":"2016-05-10T04:27:36+00:00","dateModified":"2016-06-27T15:08:27+00:00","mainEntityOfPage":{"@id":"https:\/\/www.urolime.com\/blogs\/openssl-vulnerabilities-cve-2016-2108\/"},"wordCount":540,"commentCount":0,"publisher":{"@id":"https:\/\/www.urolime.com\/blogs\/#organization"},"image":{"@id":"https:\/\/www.urolime.com\/blogs\/openssl-vulnerabilities-cve-2016-2108\/#primaryimage"},"thumbnailUrl":"https:\/\/www.urolime.com\/blogs\/wp-content\/uploads\/2016\/05\/openssl_cracked.jpg","articleSection":["General"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.urolime.com\/blogs\/openssl-vulnerabilities-cve-2016-2108\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.urolime.com\/blogs\/openssl-vulnerabilities-cve-2016-2108\/","url":"https:\/\/www.urolime.com\/blogs\/openssl-vulnerabilities-cve-2016-2108\/","name":"OpenSSL Vulnerabilities fix \u2013 CVE-2016-2108 - Urolime Blogs","isPartOf":{"@id":"https:\/\/www.urolime.com\/blogs\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.urolime.com\/blogs\/openssl-vulnerabilities-cve-2016-2108\/#primaryimage"},"image":{"@id":"https:\/\/www.urolime.com\/blogs\/openssl-vulnerabilities-cve-2016-2108\/#primaryimage"},"thumbnailUrl":"https:\/\/www.urolime.com\/blogs\/wp-content\/uploads\/2016\/05\/openssl_cracked.jpg","datePublished":"2016-05-10T04:27:36+00:00","dateModified":"2016-06-27T15:08:27+00:00","description":"OPENSSL VULNERABILITIES \u2013 CVE-2016-2108 & CVE-2016-2107","inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.urolime.com\/blogs\/openssl-vulnerabilities-cve-2016-2108\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.urolime.com\/blogs\/openssl-vulnerabilities-cve-2016-2108\/#primaryimage","url":"https:\/\/www.urolime.com\/blogs\/wp-content\/uploads\/2016\/05\/openssl_cracked.jpg","contentUrl":"https:\/\/www.urolime.com\/blogs\/wp-content\/uploads\/2016\/05\/openssl_cracked.jpg","width":834,"height":561,"caption":"openssl cracked"},{"@type":"WebSite","@id":"https:\/\/www.urolime.com\/blogs\/#website","url":"https:\/\/www.urolime.com\/blogs\/","name":"Urolime Blogs","description":"The place for DevOps, Cloud, Kubernetes News and Updates","publisher":{"@id":"https:\/\/www.urolime.com\/blogs\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.urolime.com\/blogs\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.urolime.com\/blogs\/#organization","name":"Urolime Blogs","url":"https:\/\/www.urolime.com\/blogs\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.urolime.com\/blogs\/#\/schema\/logo\/image\/","url":"https:\/\/www.urolime.com\/blogs\/wp-content\/uploads\/2021\/06\/cropped-250-x250.jpg","contentUrl":"https:\/\/www.urolime.com\/blogs\/wp-content\/uploads\/2021\/06\/cropped-250-x250.jpg","width":250,"height":73,"caption":"Urolime Blogs"},"image":{"@id":"https:\/\/www.urolime.com\/blogs\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.urolime.com\/blogs\/#\/schema\/person\/c231f59d5f2c2516e0efc6067ee0c22c","name":"Urolime Technologies","description":"Urolime Technologies has made groundbreaking accomplishments in the field of Google Cloud &amp; Kubernetes Consulting, DevOps Services, 24\/7 Managed Services &amp; Support, Dedicated IT Team, Managed AWS Consulting and Azure Cloud Consulting. We believe our customers are Smart to choose their IT Partner, and we \u201cDo IT Smart\u201d.","sameAs":["https:\/\/www.urolime.com\/"],"url":"https:\/\/www.urolime.com\/blogs\/author\/blogadmin\/"}]}},"_links":{"self":[{"href":"https:\/\/www.urolime.com\/blogs\/wp-json\/wp\/v2\/posts\/151","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.urolime.com\/blogs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.urolime.com\/blogs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.urolime.com\/blogs\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.urolime.com\/blogs\/wp-json\/wp\/v2\/comments?post=151"}],"version-history":[{"count":15,"href":"https:\/\/www.urolime.com\/blogs\/wp-json\/wp\/v2\/posts\/151\/revisions"}],"predecessor-version":[{"id":183,"href":"https:\/\/www.urolime.com\/blogs\/wp-json\/wp\/v2\/posts\/151\/revisions\/183"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.urolime.com\/blogs\/wp-json\/wp\/v2\/media\/161"}],"wp:attachment":[{"href":"https:\/\/www.urolime.com\/blogs\/wp-json\/wp\/v2\/media?parent=151"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.urolime.com\/blogs\/wp-json\/wp\/v2\/categories?post=151"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.urolime.com\/blogs\/wp-json\/wp\/v2\/tags?post=151"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}