5.8
CVSSv2

CVE-2019-1543

Published: 06/03/2019 Updated: 07/11/2023
CVSS v2 Base Score: 5.8 | Impact Score: 4.9 | Exploitability Score: 8.6
CVSS v3 Base Score: 7.4 | Impact Score: 5.2 | Exploitability Score: 2.2
VMScore: 520
Vector: AV:N/AC:M/Au:N/C:P/I:P/A:N

Vulnerability Summary

ChaCha20-Poly1305 is an AEAD cipher, and requires a unique nonce input for every encryption operation. RFC 7539 specifies that the nonce value (IV) should be 96 bits (12 bytes). OpenSSL allows a variable nonce length and front pads the nonce with 0 bytes if it is less than 12 bytes. However it also incorrectly allows a nonce to be set of up to 16 bytes. In this case only the last 12 bytes are significant and any additional leading bytes are ignored. It is a requirement of using this cipher that nonce values are unique. Messages encrypted using a reused nonce value are susceptible to serious confidentiality and integrity attacks. If an application changes the default nonce length to be longer than 12 bytes and then makes a change to the leading bytes of the nonce expecting the new value to be a new unique nonce then such an application could inadvertently encrypt messages with a reused nonce. Additionally the ignored bytes in a long nonce are not covered by the integrity guarantee of this cipher. Any application that relies on the integrity of these ignored leading bytes of a long nonce may be further affected. Any OpenSSL internal use of this cipher, including in SSL/TLS, is safe because no such use sets such a long nonce value. However user applications that use this cipher directly and set a non-default nonce length to be longer than 12 bytes may be vulnerable. OpenSSL versions 1.1.1 and 1.1.0 are affected by this issue. Due to the limited scope of affected deployments this has been assessed as low severity and therefore we are not creating new releases at this time. Fixed in OpenSSL 1.1.1c (Affected 1.1.1-1.1.1b). Fixed in OpenSSL 1.1.0k (Affected 1.1.0-1.1.0j).

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

openssl openssl

Vendor Advisories

Synopsis Low: openssl security, bug fix, and enhancement update Type/Severity Security Advisory: Low Topic An update for openssl is now available for Red Hat Enterprise Linux 8Red Hat Product Security has rated this update as having a security impact of Low A Common Vulnerability Scoring System (CVSS) bas ...
Joran Dirk Greef discovered that overly long nonces used with ChaCha20-Poly1305 were incorrectly processed and could result in nonce reuse This doesn't affect OpenSSL-internal uses of ChaCha20-Poly1305 such as TLS For the stable distribution (stretch), this problem has been fixed in version 110k-1~deb9u1 This DSA also upgrades openssl10 (whic ...
An issue has been found in OpenSSL <= 111b, where an application using ChaCha20-Poly1305 could set a non-default nonce length to be longer than 12 bytes and then mistakenly reuse a nonce ChaCha20-Poly1305 is an AEAD cipher, and requires a unique nonce input for every encryption operation RFC 7539 specifies that the nonce value (IV) should be ...

Github Repositories

Documentation Scanner for vulnerabilities in container images, file systems, and Git repositories, as well as for configuration issues Abstract Trivy (tri pronounced like trigger, vy pronounced like envy) is a simple and comprehensive scanner for vulnerabilities in container images, file systems, and Git repositories, as well as for configuration issues Trivy detects

A Simple and Comprehensive Vulnerability Scanner for Containers and other Artifacts, Suitable for CI Abstract Vul (tri pronounced like trigger, vy pronounced like envy) is a simple and comprehensive vulnerability scanner for containers and other artifacts A software vulnerability is a glitch, flaw, or weakness present in the software or in an Operating System Vul detects vul

Documentation Scanner for vulnerabilities in container images, file systems, and Git repositories, as well as for configuration issues Abstract Trivy (tri pronounced like trigger, vy pronounced like envy) is a simple and comprehensive scanner for vulnerabilities in container images, file systems, and Git repositories, as well as for configuration issues Trivy detects

Documentation Scanner for vulnerabilities in container images, file systems, and Git repositories, as well as for configuration issues Abstract Trivy (tri pronounced like trigger, vy pronounced like envy) is a simple and comprehensive scanner for vulnerabilities in container images, file systems, and Git repositories, as well as for configuration issues Trivy detects

Scanner for vulnerabilities in container images, file systems, and Git repositories, as well as for configuration issues

Documentation Scanner for vulnerabilities in container images, file systems, and Git repositories, as well as for configuration issues Abstract Trivy (tri pronounced like trigger, vy pronounced like envy) is a simple and comprehensive scanner for vulnerabilities in container images, file systems, and Git repositories, as well as for configuration issues Trivy detects

Documentation Scanner for vulnerabilities in container images, file systems, and Git repositories, as well as for configuration issues Abstract Trivy (tri pronounced like trigger, vy pronounced like envy) is a simple and comprehensive scanner for vulnerabilities in container images, file systems, and Git repositories, as well as for configuration issues Trivy detects

Documentation Scanner for vulnerabilities in container images, file systems, and Git repositories, as well as for configuration issues Abstract Trivy (tri pronounced like trigger, vy pronounced like envy) is a simple and comprehensive scanner for vulnerabilities in container images, file systems, and Git repositories, as well as for configuration issues Trivy detects

Jenkins pipeline shared library adding features for Maven, Gradle, Docker, SonarQube, Git and others

ces-build-lib Jenkins Pipeline Shared library, that contains additional features for Git, Maven, etc in an object-oriented manner as well as some additional pipeline steps Table of contents Usage Syntax completion Maven Maven from local Jenkins tool Maven Wrapper With local JDK tool With the JDK provided by the build agent Maven in Docker Plain Maven In Docker Maven

Fast, reliable cipher, hash and hmac methods executed in Node's threadpool for multi-core throughput.

@ronomon/crypto-async Fast, reliable cipher, hash and hmac methods executed in Node's threadpool for multi-core throughput Motivation Some longstanding issues with Node's crypto module Did you know that Node's cipher, hash and hmac streams are not truly asynchronous? They execute in C, but only in the main thread and so the crypto module blocks your event loop

Documentation Scanner for vulnerabilities in container images, file systems, and Git repositories, as well as for configuration issues Abstract Trivy (tri pronounced like trigger, vy pronounced like envy) is a simple and comprehensive scanner for vulnerabilities in container images, file systems, and Git repositories, as well as for configuration issues Trivy detects

https://github.com/aquasecurity/trivy

A Simple and Comprehensive Vulnerability Scanner for Containers and other Artifacts, Suitable for CI Abstract Trivy (tri pronounced like trigger, vy pronounced like envy) is a simple and comprehensive vulnerability scanner for containers and other artifacts A software vulnerability is a glitch, flaw, or weakness present in the software or in an Operating System Trivy detects

Documentation Scanner for vulnerabilities in container images, file systems, and Git repositories, as well as for configuration issues Abstract Trivy (tri pronounced like trigger, vy pronounced like envy) is a simple and comprehensive scanner for vulnerabilities in container images, file systems, and Git repositories, as well as for configuration issues Trivy detects

A REST API server for https://github.com/knqyf263/trivy

REST APIs for Trivy Supported tags and respective Dockerfile links: ・latest (versions/01/Dockerfile) ・01 (versions/01/Dockerfile) ・01-db (versions/01-db/Dockerfile) Usage Run the API server $ docker run --name trivy -d --rm -p 9000:9000 \ -v "${HOME}/Library/Caches/trivy":/root/cache/trivy \ pottava/trivy:01

Documentation Scanner for vulnerabilities in container images, file systems, and Git repositories, as well as for configuration issues Abstract Vul (tri pronounced like trigger, vy pronounced like envy) is a simple and comprehensive scanner for vulnerabilities in container images, file systems, and Git repositories, as well as for configuration issues Vul detects vul