[Forgot Password]
Login  Register Subscribe

30430

 
 

423868

 
 

247768

 
 

909

 
 

194555

 
 

282

Paid content will be excluded from the download.


Download | Alert*
CVE
view JSON

CVE-2019-1559Date: (C)2019-06-19   (M)2024-03-15


If an application encounters a fatal protocol error and then calls SSL_shutdown() twice (once to send a close_notify, and once to receive one) then OpenSSL can respond differently to the calling application if a 0 byte record is received with invalid padding compared to if a 0 byte record is received with an invalid MAC. If the application then behaves differently based on that in a way that is detectable to the remote peer, then this amounts to a padding oracle that could be used to decrypt data. In order for this to be exploitable "non-stitched" ciphersuites must be in use. Stitched ciphersuites are optimised implementations of certain commonly used ciphersuites. Also the application must call SSL_shutdown() twice even if a protocol error has occurred (applications should not do this but some do anyway). Fixed in OpenSSL 1.0.2r (Affected 1.0.2-1.0.2q).

CVSS Score and Metrics +CVSS Score and Metrics -

CVSS V3 Severity:CVSS V2 Severity:
CVSS Score : 5.9CVSS Score : 4.3
Exploit Score: 2.2Exploit Score: 8.6
Impact Score: 3.6Impact Score: 2.9
 
CVSS V3 Metrics:CVSS V2 Metrics:
Attack Vector: NETWORKAccess Vector: NETWORK
Attack Complexity: HIGHAccess Complexity: MEDIUM
Privileges Required: NONEAuthentication: NONE
User Interaction: NONEConfidentiality: PARTIAL
Scope: UNCHANGEDIntegrity: NONE
Confidentiality: HIGHAvailability: NONE
Integrity: NONE 
Availability: NONE 
  
Reference:
BID-107174
DSA-4400
FEDORA-2019-00c25b9379
FEDORA-2019-9a0a7c0986
FEDORA-2019-db06efdea1
GLSA-201903-10
RHSA-2019:2304
RHSA-2019:2437
RHSA-2019:2439
RHSA-2019:2471
RHSA-2019:3929
RHSA-2019:3931
USN-3899-1
USN-4376-2
https://lists.debian.org/debian-lts-announce/2019/03/msg00003.html
https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=e9bbefbf0f24c57645e7ad6a5a71ae649d18ac8e
https://kc.mcafee.com/corporate/index?page=content&id=SB10282
https://security.netapp.com/advisory/ntap-20190301-0001/
https://security.netapp.com/advisory/ntap-20190301-0002/
https://security.netapp.com/advisory/ntap-20190423-0002/
https://support.f5.com/csp/article/K18549143
https://support.f5.com/csp/article/K18549143?utm_source=f5support&%3Butm_medium=RSS
https://www.openssl.org/news/secadv/20190226.txt
https://www.oracle.com/security-alerts/cpujan2020.html
https://www.oracle.com/security-alerts/cpujan2021.html
https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html
https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html
https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html
https://www.tenable.com/security/tns-2019-02
https://www.tenable.com/security/tns-2019-03
openSUSE-SU-2019:1076
openSUSE-SU-2019:1105
openSUSE-SU-2019:1173
openSUSE-SU-2019:1175
openSUSE-SU-2019:1432
openSUSE-SU-2019:1637

CPE    16
cpe:/o:debian:debian_linux:9.0
cpe:/o:redhat:enterprise_linux_server:6.0
cpe:/a:oracle:jd_edwards_enterpriseone_tools:9.2
cpe:/o:redhat:enterprise_linux_workstation:7.0
...
CWE    1
CWE-203
OVAL    27
oval:org.secpod.oval:def:60339
oval:org.secpod.oval:def:83397
oval:org.secpod.oval:def:89003148
oval:org.secpod.oval:def:89003069
...

© SecPod Technologies