[Forgot Password]
Login  Register Subscribe

24547

 
 

132804

 
 

129935

 
 

909

 
 

106980

 
 

152

Paid content will be excluded from the download.


Download | Alert*
CVE
view XML view JSON

CVE-2019-1559Date: (C)2019-06-19   (M)2019-09-17


If an application encounters a fatal protocol error and then calls SSL_shutdown() twice (once to send a close_notify, and once to receive one) then OpenSSL can respond differently to the calling application if a 0 byte record is received with invalid padding compared to if a 0 byte record is received with an invalid MAC. If the application then behaves differently based on that in a way that is detectable to the remote peer, then this amounts to a padding oracle that could be used to decrypt data. In order for this to be exploitable "non-stitched" ciphersuites must be in use. Stitched ciphersuites are optimised implementations of certain commonly used ciphersuites. Also the application must call SSL_shutdown() twice even if a protocol error has occurred (applications should not do this but some do anyway). Fixed in OpenSSL 1.0.2r (Affected 1.0.2-1.0.2q).

CVSS Score and Metrics +CVSS Score and Metrics -

CVSS V3 Severity:CVSS V2 Severity:
CVSS Score : 5.9CVSS Score : 4.3
Exploit Score: 2.2Exploit Score: 8.6
Impact Score: 3.6Impact Score: 2.9
 
CVSS V3 Metrics:CVSS V2 Metrics:
Attack Vector: NETWORKAccess Vector: NETWORK
Attack Complexity: HIGHAccess Complexity: MEDIUM
Privileges Required: NONEAuthentication: NONE
User Interaction: NONEConfidentiality: PARTIAL
Scope: UNCHANGEDIntegrity: NONE
Confidentiality: HIGHAvailability: NONE
Integrity: NONE 
Availability: NONE 
  
Reference:
BID-107174
DSA-4400
GLSA-201903-10
RHSA-2019:2304
RHSA-2019:2437
RHSA-2019:2439
USN-3899-1
https://lists.debian.org/debian-lts-announce/2019/03/msg00003.html
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=e9bbefbf0f24c57645e7ad6a5a71ae649d18ac8e
https://kc.mcafee.com/corporate/index?page=content&id=SB10282
https://security.netapp.com/advisory/ntap-20190301-0001/
https://security.netapp.com/advisory/ntap-20190301-0002/
https://security.netapp.com/advisory/ntap-20190423-0002/
https://support.f5.com/csp/article/K18549143
https://www.openssl.org/news/secadv/20190226.txt
https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html
https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html
https://www.tenable.com/security/tns-2019-02
https://www.tenable.com/security/tns-2019-03
openSUSE-SU-2019:1076
openSUSE-SU-2019:1105
openSUSE-SU-2019:1173
openSUSE-SU-2019:1175
openSUSE-SU-2019:1432
openSUSE-SU-2019:1637

CPE    13
cpe:/o:canonical:ubuntu_linux:16.04::~~lts~~~
cpe:/o:debian:debian_linux:9.0
cpe:/a:openssl:openssl:1.0.2
cpe:/a:openssl:openssl:1.0.2:beta3
...
CWE    1
CWE-200
OVAL    11
oval:org.secpod.oval:def:1901120
oval:org.secpod.oval:def:51229
oval:org.secpod.oval:def:1700153
oval:org.secpod.oval:def:603677
...

© SecPod Technologies