384
VMScore

CVE-2019-1559

Published: 27/02/2019 Updated: 07/11/2023
CVSS v2 Base Score: 4.3 | Impact Score: 2.9 | Exploitability Score: 8.6
CVSS v3 Base Score: 5.9 | Impact Score: 3.6 | Exploitability Score: 2.2
VMScore: 384
Vector: AV:N/AC:M/Au:N/C:P/I:N/A:N

Vulnerability Summary

A padding oracle has been found in OpenSSL versions before 1.0.2r. This issue does not impact OpenSSL 1.1.1 or 1.1.0. If an application encounters a fatal protocol error and then calls SSL_shutdown() twice (once to send a close_notify, and once to receive one) then OpenSSL can respond differently to the calling application if a 0 byte record is received with invalid padding compared to if a 0 byte record is received with an invalid MAC. If the application then behaves differently based on that in a way that is detectable to the remote peer, then this amounts to a padding oracle that could be used to decrypt data. In order for this to be exploitable "non-stitched" ciphersuites must be in use. Stitched ciphersuites are optimised implementations of certain commonly used ciphersuites. Also the application must call SSL_shutdown() twice even if a protocol error has occurred (applications should not do this but some do anyway). AEAD ciphersuites are not impacted.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

openssl openssl

canonical ubuntu linux 18.04

canonical ubuntu linux 18.10

canonical ubuntu linux 16.04

debian debian linux 8.0

debian debian linux 9.0

netapp hyper converged infrastructure -

netapp cloud backup -

netapp santricity smi-s provider -

netapp element software -

netapp snapdrive -

netapp snapcenter -

netapp storage automation store -

netapp ontap select deploy -

netapp steelstore cloud integrated storage -

netapp oncommand unified manager -

netapp oncommand workflow automation -

netapp storagegrid -

netapp storagegrid

netapp oncommand insight -

netapp ontap select deploy administration utility -

netapp service processor -

netapp smi-s provider -

netapp clustered data ontap antivirus connector -

netapp active iq unified manager

netapp solidfire -

netapp hci management node -

netapp snapprotect -

netapp hci compute node -

netapp oncommand unified manager core package -

netapp active iq unified manager -

netapp altavault -

f5 traffix signaling delivery controller

f5 traffix signaling delivery controller 4.4.0

f5 big-iq centralized management

f5 big-ip local traffic manager

f5 big-ip advanced firewall manager

f5 big-ip application acceleration manager

f5 big-ip analytics

f5 big-ip access policy manager

f5 big-ip application security manager

f5 big-ip edge gateway

f5 big-ip fraud protection service

f5 big-ip global traffic manager

f5 big-ip link controller

f5 big-ip policy enforcement manager

f5 big-ip webaccelerator

f5 big-ip domain name system

tenable nessus

opensuse leap 42.3

opensuse leap 15.0

opensuse leap 15.1

netapp cn1610_firmware -

netapp a320_firmware -

netapp c190_firmware -

netapp a220_firmware -

netapp fas2720_firmware -

netapp fas2750_firmware -

netapp a800_firmware -

fedoraproject fedora 29

fedoraproject fedora 30

fedoraproject fedora 31

mcafee data exchange layer

mcafee agent

mcafee threat intelligence exchange server

mcafee web gateway

redhat jboss_enterprise_web_server 5.0.0

redhat virtualization 4.0

redhat virtualization_host 4.0

redhat enterprise linux desktop 7.0

redhat enterprise linux workstation 7.0

redhat enterprise linux server 7.0

redhat enterprise linux desktop 6.0

redhat enterprise linux server 6.0

redhat enterprise linux workstation 6.0

oracle jd edwards enterpriseone tools 9.2

oracle api gateway 11.1.2.4.0

oracle business intelligence 11.1.1.9.0

oracle peoplesoft enterprise peopletools 8.55

oracle peoplesoft enterprise peopletools 8.56

oracle business intelligence 12.2.1.3.0

oracle enterprise manager ops center 12.3.3

oracle peoplesoft enterprise peopletools 8.57

oracle secure global desktop 5.4

oracle mysql

oracle communications session border controller 8.1.0

oracle communications session border controller 8.0.0

oracle jd edwards world security a9.3

oracle jd edwards world security a9.4

oracle business intelligence 12.2.1.4.0

oracle enterprise manager base platform 13.2.0.0.0

oracle enterprise manager base platform 12.1.0.5.0

oracle enterprise manager base platform 13.3.0.0.0

oracle enterprise manager ops center 12.4.0

oracle services tools bundle 19.2

oracle communications diameter signaling router 8.0.0

oracle communications diameter signaling router 8.1

oracle communications diameter signaling router 8.2

oracle communications diameter signaling router 8.3

oracle communications session border controller 8.3

oracle communications performance intelligence center 10.4.0.2

oracle communications session border controller 8.2

oracle mysql enterprise monitor

oracle jd edwards world security a9.3.1

oracle communications session router 7.4

oracle communications session router 8.0

oracle communications session router 8.1

oracle endeca server 7.7.0

oracle mysql workbench

oracle communications session router 8.2

oracle communications session router 8.3

oracle communications session border controller 7.4

oracle communications diameter signaling router 8.4

oracle communications unified session manager 7.3.5

oracle communications unified session manager 8.2.5

paloaltonetworks pan-os

nodejs node.js

Vendor Advisories

Debian Bug report logs - #927308 mysql-57: Security fixes from the April 2019 CPU Package: src:mysql-57; Maintainer for src:mysql-57 is Debian MySQL Maintainers <pkg-mysql-maint@listsaliothdebianorg>; Reported by: Salvatore Bonaccorso <carnil@debianorg> Date: Wed, 17 Apr 2019 19:57:02 UTC Severity: grave Tags: ...
OpenSSL could be made to expose sensitive information over the network ...
Juraj Somorovsky, Robert Merget and Nimrod Aviram discovered a padding oracle attack in OpenSSL For the stable distribution (stretch), this problem has been fixed in version 102r-1~deb9u1 We recommend that you upgrade your openssl10 packages For the detailed security status of openssl10 please refer to its security tracker page at: s ...
Synopsis Important: Red Hat Virtualization security update Type/Severity Security Advisory: Important Topic An update for redhat-virtualization-host is now available for Red Hat Virtualization 4 for Red Hat Enterprise Linux 7Red Hat Product Security has rated this update as having a security impact of Impo ...
Synopsis Moderate: rhvm-appliance security, bug fix, and enhancement update Type/Severity Security Advisory: Moderate Topic An update for rhvm-appliance is now available for Red Hat Virtualization 4 for Red Hat Enterprise Linux 7Red Hat Product Security has rated this update as having a security impact of ...
Synopsis Moderate: openssl security update Type/Severity Security Advisory: Moderate Topic An update for openssl is now available for Red Hat Enterprise Linux 6Red Hat Product Security has rated this update as having a security impact of Moderate A Common Vulnerability Scoring System (CVSS) base score, wh ...
Synopsis Moderate: Red Hat JBoss Web Server 52 security release Type/Severity Security Advisory: Moderate Topic Red Hat JBoss Web Server 520 zip release for RHEL 6, RHEL 7, RHEL 8 and Microsoft Windows is availableRed Hat Product Security has rated this update as having a security impactof Moderate A C ...
Synopsis Moderate: Red Hat JBoss Web Server 52 security release Type/Severity Security Advisory: Moderate Topic Updated Red Hat JBoss Web Server 520 packages are now available for Red Hat Enterprise Linux 6, Red Hat Enterprise Linux 7, and Red Hat Enterprise Linux 8Red Hat Product Security has rated thi ...
Synopsis Moderate: openssl security and bug fix update Type/Severity Security Advisory: Moderate Topic An update for openssl is now available for Red Hat Enterprise Linux 7Red Hat Product Security has rated this update as having a security impact of Moderate A Common Vulnerability Scoring System (CVSS) ba ...
A microprocessor side-channel vulnerability was found on SMT (eg, Hyper-Threading) architectures An attacker running a malicious process on the same core of the processor as the victim process can extract certain secret information (CVE-2018-5407) If an application encounters a fatal protocol error and then calls SSL_shutdown() twice (once to s ...
A microprocessor side-channel vulnerability was found on SMT (eg, Hyper-Threading) architectures An attacker running a malicious process on the same core of the processor as the victim process can extract certain secret information(CVE-2018-5407) If an application encounters a fatal protocol error and then calls SSL_shutdown() twice (once to sen ...
If an application encounters a fatal protocol error and then calls SSL_shutdown() twice (once to send a close_notify, and once to receive one) then OpenSSL can respond differently to the calling application if a 0 byte record is received with invalid padding compared to if a 0 byte record is received with an invalid MAC If the application then beh ...
Impact: Moderate Public Date: 2019-02-26 CWE: CWE-325 Bugzilla: 1683804: CVE-2019-1559 openssl: 0-byte ...
A padding oracle has been found in OpenSSL versions prior to 102r This issue does not impact OpenSSL 111 or 110 If an application encounters a fatal protocol error and then calls SSL_shutdown() twice (once to send a close_notify, and once to receive one) then OpenSSL can respond differently to the calling application if a 0 byte record is r ...
Nessus leverages third-party software to help provide underlying functionality Two separate third-party components (OpenSSL and Momentjs) were found to contain vulnerabilities, and updated versions have been made available by the providers Out of caution and in line with good practice, Tenable opted to upgrade the bundled libraries to address ...
Nessus Agent leverages third-party software to help provide underlying functionality One of the third-party components (OpenSSL) was found to contain a single vulnerability, and updated versions have been made available by the providers Out of caution and in line with good practice, Tenable opted to upgrade the bundled library to address the po ...
A vulnerability (CVE-2019-1559) exists in JP1 Affected products and versions are listed below Please upgrade your version to the appropriate version ...
A vulnerability (CVE-2019-1559) exists in Cosminexus HTTP Server Affected products and versions are listed below Please upgrade your version to the appropriate version This problem occurs only if the SSL function is being used ...
Multiple vulnerabilities have been found in JP1/Automatic Job Management System 3 - Web Operation Assistant CVE-2018-0739, CVE-2018-1301, CVE-2019-1559, CVE-2019-1563, CVE-2020-1938 Affected products and versions are listed below Please upgrade your version to the appropriate version ...
CVE-2019-1559 OpenSSL vulnerability CVE-2019-1559 has been resolved in PAN-OS ...

Github Repositories

New TLS Padding Oracles

TLS Padding Oracles The TLS protocol provides encryption, data integrity, and authentication on the modern Internet Despite the protocol’s importance, currently-deployed TLS versions use obsolete cryptographic algorithms which have been broken using various attacks One prominent class of such attacks is CBC padding oracle attacks These attacks allow an adversary to dec

New TLS Padding Oracles

TLS Padding Oracles The TLS protocol provides encryption, data integrity, and authentication on the modern Internet Despite the protocol’s importance, currently-deployed TLS versions use obsolete cryptographic algorithms which have been broken using various attacks One prominent class of such attacks is CBC padding oracle attacks These attacks allow an adversary to dec

https://community.letsencrypt.org/t/rhel-centos-6-openssl-client-compatibility-after-dst-root-ca-x3-expiration/161032/62

Centos 6 openssl-101e Patch - Always Set "Trusted First" CLI Flag Clean & simple solution by pajkd @ communityletsencryptorg/u/pajkd communityletsencryptorg/t/rhel-centos-6-openssl-client-compatibility-after-dst-root-ca-x3-expiration/161032/62 This solution will take the latest openssl source RPM packages and will add a simple patch to al

References

CWE-203https://www.openssl.org/news/secadv/20190226.txthttps://usn.ubuntu.com/3899-1/http://www.securityfocus.com/bid/107174https://www.debian.org/security/2019/dsa-4400https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.htmlhttps://access.redhat.com/errata/RHSA-2019:3929https://access.redhat.com/errata/RHSA-2019:3931https://www.oracle.com/security-alerts/cpujan2020.htmlhttps://usn.ubuntu.com/4376-2/https://www.oracle.com/security-alerts/cpujan2021.htmlhttps://access.redhat.com/errata/RHSA-2019:2471https://access.redhat.com/errata/RHSA-2019:2439https://access.redhat.com/errata/RHSA-2019:2437https://access.redhat.com/errata/RHSA-2019:2304https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.htmlhttp://lists.opensuse.org/opensuse-security-announce/2019-06/msg00080.htmlhttp://lists.opensuse.org/opensuse-security-announce/2019-05/msg00049.htmlhttps://kc.mcafee.com/corporate/index?page=content&id=SB10282https://www.tenable.com/security/tns-2019-03https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.htmlhttps://security.netapp.com/advisory/ntap-20190423-0002/http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00046.htmlhttp://lists.opensuse.org/opensuse-security-announce/2019-04/msg00047.htmlhttp://lists.opensuse.org/opensuse-security-announce/2019-04/msg00019.htmlhttp://lists.opensuse.org/opensuse-security-announce/2019-03/msg00041.htmlhttps://www.tenable.com/security/tns-2019-02https://support.f5.com/csp/article/K18549143https://security.gentoo.org/glsa/201903-10https://security.netapp.com/advisory/ntap-20190301-0001/https://security.netapp.com/advisory/ntap-20190301-0002/https://lists.debian.org/debian-lts-announce/2019/03/msg00003.htmlhttps://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/EWC42UXL5GHTU5G77VKBF6JYUUNGSHOM/https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZBEV5QGDRFUZDMNECFXUSN5FMYOZDE4V/https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/Y3IVFGSERAZLNJCK35TEM2R4726XIH3Z/https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=e9bbefbf0f24c57645e7ad6a5a71ae649d18ac8ehttps://support.f5.com/csp/article/K18549143?utm_source=f5support&%3Butm_medium=RSShttps://bugs.debian.org/cgi-bin/bugreport.cgi?bug=927308https://usn.ubuntu.com/3899-1/https://nvd.nist.govhttps://security.archlinux.org/CVE-2019-1559