Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2019-1563

Опубликовано: 10 сент. 2019
Источник: ubuntu
Приоритет: low
EPSS Низкий
CVSS2: 4.3
CVSS3: 3.7

Описание

In situations where an attacker receives automated notification of the success or failure of a decryption attempt an attacker, after sending a very large number of messages to be decrypted, can recover a CMS/PKCS7 transported encryption key or decrypt any RSA encrypted message that was encrypted with the public RSA key, using a Bleichenbacher padding oracle attack. Applications are not affected if they use a certificate together with the private RSA key to the CMS_decrypt or PKCS7_decrypt functions to select the correct recipient info to decrypt. Fixed in OpenSSL 1.1.1d (Affected 1.1.1-1.1.1c). Fixed in OpenSSL 1.1.0l (Affected 1.1.0-1.1.0k). Fixed in OpenSSL 1.0.2t (Affected 1.0.2-1.0.2s).

РелизСтатусПримечание
bionic

ignored

end of standard support, was needed
devel

not-affected

0~20191122.bd85bf54-2
disco

ignored

end of life
eoan

ignored

end of life
esm-apps/bionic

needed

esm-apps/xenial

needed

esm-infra-legacy/trusty

DNE

esm-infra/focal

not-affected

0~20191122.bd85bf54-2
focal

not-affected

0~20191122.bd85bf54-2
groovy

not-affected

0~20191122.bd85bf54-2

Показывать по

РелизСтатусПримечание
bionic

not-affected

uses system openssl1.0
devel

not-affected

uses system openssl1.1
disco

not-affected

uses system openssl1.1
eoan

not-affected

uses system openssl1.1
esm-apps/bionic

not-affected

uses system openssl1.0
esm-apps/focal

not-affected

uses system openssl1.1
esm-apps/jammy

needed

esm-apps/noble

not-affected

uses system openssl1.1
esm-apps/xenial

not-affected

uses system openssl
esm-infra-legacy/trusty

not-affected

uses system openssl

Показывать по

РелизСтатусПримечание
bionic

released

1.1.1-1ubuntu2.1~18.04.6
devel

released

1.1.1d-2ubuntu1
disco

ignored

end of life
eoan

released

1.1.1c-1ubuntu4.1
esm-infra-legacy/trusty

released

1.0.1f-1ubuntu2.27+esm1
esm-infra/bionic

released

1.1.1-1ubuntu2.1~18.04.6
esm-infra/focal

released

1.1.1d-2ubuntu1
esm-infra/xenial

released

1.0.2g-1ubuntu4.16
fips-preview/jammy

released

1.1.1d-2ubuntu1
fips-updates/bionic

released

1.1.1-1ubuntu2.fips.2.1~18.04.6.1

Показывать по

РелизСтатусПримечание
bionic

released

1.0.2n-1ubuntu5.4
devel

DNE

disco

DNE

eoan

DNE

esm-infra-legacy/trusty

DNE

esm-infra/bionic

released

1.0.2n-1ubuntu5.4
esm-infra/focal

DNE

focal

DNE

groovy

DNE

hirsute

DNE

Показывать по

EPSS

Процентиль: 82%
0.01633
Низкий

4.3 Medium

CVSS2

3.7 Low

CVSS3

Связанные уязвимости

CVSS3: 3.7
redhat
больше 6 лет назад

In situations where an attacker receives automated notification of the success or failure of a decryption attempt an attacker, after sending a very large number of messages to be decrypted, can recover a CMS/PKCS7 transported encryption key or decrypt any RSA encrypted message that was encrypted with the public RSA key, using a Bleichenbacher padding oracle attack. Applications are not affected if they use a certificate together with the private RSA key to the CMS_decrypt or PKCS7_decrypt functions to select the correct recipient info to decrypt. Fixed in OpenSSL 1.1.1d (Affected 1.1.1-1.1.1c). Fixed in OpenSSL 1.1.0l (Affected 1.1.0-1.1.0k). Fixed in OpenSSL 1.0.2t (Affected 1.0.2-1.0.2s).

CVSS3: 3.7
nvd
больше 6 лет назад

In situations where an attacker receives automated notification of the success or failure of a decryption attempt an attacker, after sending a very large number of messages to be decrypted, can recover a CMS/PKCS7 transported encryption key or decrypt any RSA encrypted message that was encrypted with the public RSA key, using a Bleichenbacher padding oracle attack. Applications are not affected if they use a certificate together with the private RSA key to the CMS_decrypt or PKCS7_decrypt functions to select the correct recipient info to decrypt. Fixed in OpenSSL 1.1.1d (Affected 1.1.1-1.1.1c). Fixed in OpenSSL 1.1.0l (Affected 1.1.0-1.1.0k). Fixed in OpenSSL 1.0.2t (Affected 1.0.2-1.0.2s).

CVSS3: 3.7
debian
больше 6 лет назад

In situations where an attacker receives automated notification of the ...

suse-cvrf
около 6 лет назад

Security update for openssl

CVSS3: 3.7
github
больше 3 лет назад

In situations where an attacker receives automated notification of the success or failure of a decryption attempt an attacker, after sending a very large number of messages to be decrypted, can recover a CMS/PKCS7 transported encryption key or decrypt any RSA encrypted message that was encrypted with the public RSA key, using a Bleichenbacher padding oracle attack. Applications are not affected if they use a certificate together with the private RSA key to the CMS_decrypt or PKCS7_decrypt functions to select the correct recipient info to decrypt. Fixed in OpenSSL 1.1.1d (Affected 1.1.1-1.1.1c). Fixed in OpenSSL 1.1.0l (Affected 1.1.0-1.1.0k). Fixed in OpenSSL 1.0.2t (Affected 1.0.2-1.0.2s).

EPSS

Процентиль: 82%
0.01633
Низкий

4.3 Medium

CVSS2

3.7 Low

CVSS3

Уязвимость CVE-2019-1563