Логотип exploitDog
bind:CVE-2019-1543
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2019-1543

Количество 11

Количество 11

ubuntu логотип

CVE-2019-1543

больше 6 лет назад

ChaCha20-Poly1305 is an AEAD cipher, and requires a unique nonce input for every encryption operation. RFC 7539 specifies that the nonce value (IV) should be 96 bits (12 bytes). OpenSSL allows a variable nonce length and front pads the nonce with 0 bytes if it is less than 12 bytes. However it also incorrectly allows a nonce to be set of up to 16 bytes. In this case only the last 12 bytes are significant and any additional leading bytes are ignored. It is a requirement of using this cipher that nonce values are unique. Messages encrypted using a reused nonce value are susceptible to serious confidentiality and integrity attacks. If an application changes the default nonce length to be longer than 12 bytes and then makes a change to the leading bytes of the nonce expecting the new value to be a new unique nonce then such an application could inadvertently encrypt messages with a reused nonce. Additionally the ignored bytes in a long nonce are not covered by the integrity guarantee of...

CVSS3: 7.4
EPSS: Низкий
redhat логотип

CVE-2019-1543

больше 6 лет назад

ChaCha20-Poly1305 is an AEAD cipher, and requires a unique nonce input for every encryption operation. RFC 7539 specifies that the nonce value (IV) should be 96 bits (12 bytes). OpenSSL allows a variable nonce length and front pads the nonce with 0 bytes if it is less than 12 bytes. However it also incorrectly allows a nonce to be set of up to 16 bytes. In this case only the last 12 bytes are significant and any additional leading bytes are ignored. It is a requirement of using this cipher that nonce values are unique. Messages encrypted using a reused nonce value are susceptible to serious confidentiality and integrity attacks. If an application changes the default nonce length to be longer than 12 bytes and then makes a change to the leading bytes of the nonce expecting the new value to be a new unique nonce then such an application could inadvertently encrypt messages with a reused nonce. Additionally the ignored bytes in a long nonce are not covered by the integrity guarantee of...

CVSS3: 2.9
EPSS: Низкий
nvd логотип

CVE-2019-1543

больше 6 лет назад

ChaCha20-Poly1305 is an AEAD cipher, and requires a unique nonce input for every encryption operation. RFC 7539 specifies that the nonce value (IV) should be 96 bits (12 bytes). OpenSSL allows a variable nonce length and front pads the nonce with 0 bytes if it is less than 12 bytes. However it also incorrectly allows a nonce to be set of up to 16 bytes. In this case only the last 12 bytes are significant and any additional leading bytes are ignored. It is a requirement of using this cipher that nonce values are unique. Messages encrypted using a reused nonce value are susceptible to serious confidentiality and integrity attacks. If an application changes the default nonce length to be longer than 12 bytes and then makes a change to the leading bytes of the nonce expecting the new value to be a new unique nonce then such an application could inadvertently encrypt messages with a reused nonce. Additionally the ignored bytes in a long nonce are not covered by the integrity guarantee of th

CVSS3: 7.4
EPSS: Низкий
debian логотип

CVE-2019-1543

больше 6 лет назад

ChaCha20-Poly1305 is an AEAD cipher, and requires a unique nonce input ...

CVSS3: 7.4
EPSS: Низкий
suse-cvrf логотип

openSUSE-SU-2019:1147-1

около 6 лет назад

Security update for openssl-1_1

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2019:0787-1

около 6 лет назад

Security update for openssl-1_1

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2019:0678-1

около 6 лет назад

Security update for openssl-1_1

EPSS: Низкий
github логотип

GHSA-qpgr-gj53-5m6w

около 3 лет назад

ChaCha20-Poly1305 is an AEAD cipher, and requires a unique nonce input for every encryption operation. RFC 7539 specifies that the nonce value (IV) should be 96 bits (12 bytes). OpenSSL allows a variable nonce length and front pads the nonce with 0 bytes if it is less than 12 bytes. However it also incorrectly allows a nonce to be set of up to 16 bytes. In this case only the last 12 bytes are significant and any additional leading bytes are ignored. It is a requirement of using this cipher that nonce values are unique. Messages encrypted using a reused nonce value are susceptible to serious confidentiality and integrity attacks. If an application changes the default nonce length to be longer than 12 bytes and then makes a change to the leading bytes of the nonce expecting the new value to be a new unique nonce then such an application could inadvertently encrypt messages with a reused nonce. Additionally the ignored bytes in a long nonce are not covered by the integrity guarantee of...

CVSS3: 7.4
EPSS: Низкий
fstec логотип

BDU:2019-01289

больше 6 лет назад

Уязвимость библиотеки OpenSSL, связанная с ошибками криптографических преобразований, позволяющая нарушителю раскрыть защищаемую информацию

CVSS3: 3.7
EPSS: Низкий
oracle-oval логотип

ELSA-2019-3700

больше 5 лет назад

ELSA-2019-3700: openssl security, bug fix, and enhancement update (LOW)

EPSS: Низкий
suse-cvrf логотип

openSUSE-SU-2019:1814-1

почти 6 лет назад

Security update for virtualbox

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
ubuntu логотип
CVE-2019-1543

ChaCha20-Poly1305 is an AEAD cipher, and requires a unique nonce input for every encryption operation. RFC 7539 specifies that the nonce value (IV) should be 96 bits (12 bytes). OpenSSL allows a variable nonce length and front pads the nonce with 0 bytes if it is less than 12 bytes. However it also incorrectly allows a nonce to be set of up to 16 bytes. In this case only the last 12 bytes are significant and any additional leading bytes are ignored. It is a requirement of using this cipher that nonce values are unique. Messages encrypted using a reused nonce value are susceptible to serious confidentiality and integrity attacks. If an application changes the default nonce length to be longer than 12 bytes and then makes a change to the leading bytes of the nonce expecting the new value to be a new unique nonce then such an application could inadvertently encrypt messages with a reused nonce. Additionally the ignored bytes in a long nonce are not covered by the integrity guarantee of...

CVSS3: 7.4
4%
Низкий
больше 6 лет назад
redhat логотип
CVE-2019-1543

ChaCha20-Poly1305 is an AEAD cipher, and requires a unique nonce input for every encryption operation. RFC 7539 specifies that the nonce value (IV) should be 96 bits (12 bytes). OpenSSL allows a variable nonce length and front pads the nonce with 0 bytes if it is less than 12 bytes. However it also incorrectly allows a nonce to be set of up to 16 bytes. In this case only the last 12 bytes are significant and any additional leading bytes are ignored. It is a requirement of using this cipher that nonce values are unique. Messages encrypted using a reused nonce value are susceptible to serious confidentiality and integrity attacks. If an application changes the default nonce length to be longer than 12 bytes and then makes a change to the leading bytes of the nonce expecting the new value to be a new unique nonce then such an application could inadvertently encrypt messages with a reused nonce. Additionally the ignored bytes in a long nonce are not covered by the integrity guarantee of...

CVSS3: 2.9
4%
Низкий
больше 6 лет назад
nvd логотип
CVE-2019-1543

ChaCha20-Poly1305 is an AEAD cipher, and requires a unique nonce input for every encryption operation. RFC 7539 specifies that the nonce value (IV) should be 96 bits (12 bytes). OpenSSL allows a variable nonce length and front pads the nonce with 0 bytes if it is less than 12 bytes. However it also incorrectly allows a nonce to be set of up to 16 bytes. In this case only the last 12 bytes are significant and any additional leading bytes are ignored. It is a requirement of using this cipher that nonce values are unique. Messages encrypted using a reused nonce value are susceptible to serious confidentiality and integrity attacks. If an application changes the default nonce length to be longer than 12 bytes and then makes a change to the leading bytes of the nonce expecting the new value to be a new unique nonce then such an application could inadvertently encrypt messages with a reused nonce. Additionally the ignored bytes in a long nonce are not covered by the integrity guarantee of th

CVSS3: 7.4
4%
Низкий
больше 6 лет назад
debian логотип
CVE-2019-1543

ChaCha20-Poly1305 is an AEAD cipher, and requires a unique nonce input ...

CVSS3: 7.4
4%
Низкий
больше 6 лет назад
suse-cvrf логотип
openSUSE-SU-2019:1147-1

Security update for openssl-1_1

4%
Низкий
около 6 лет назад
suse-cvrf логотип
SUSE-SU-2019:0787-1

Security update for openssl-1_1

4%
Низкий
около 6 лет назад
suse-cvrf логотип
SUSE-SU-2019:0678-1

Security update for openssl-1_1

4%
Низкий
около 6 лет назад
github логотип
GHSA-qpgr-gj53-5m6w

ChaCha20-Poly1305 is an AEAD cipher, and requires a unique nonce input for every encryption operation. RFC 7539 specifies that the nonce value (IV) should be 96 bits (12 bytes). OpenSSL allows a variable nonce length and front pads the nonce with 0 bytes if it is less than 12 bytes. However it also incorrectly allows a nonce to be set of up to 16 bytes. In this case only the last 12 bytes are significant and any additional leading bytes are ignored. It is a requirement of using this cipher that nonce values are unique. Messages encrypted using a reused nonce value are susceptible to serious confidentiality and integrity attacks. If an application changes the default nonce length to be longer than 12 bytes and then makes a change to the leading bytes of the nonce expecting the new value to be a new unique nonce then such an application could inadvertently encrypt messages with a reused nonce. Additionally the ignored bytes in a long nonce are not covered by the integrity guarantee of...

CVSS3: 7.4
4%
Низкий
около 3 лет назад
fstec логотип
BDU:2019-01289

Уязвимость библиотеки OpenSSL, связанная с ошибками криптографических преобразований, позволяющая нарушителю раскрыть защищаемую информацию

CVSS3: 3.7
4%
Низкий
больше 6 лет назад
oracle-oval логотип
ELSA-2019-3700

ELSA-2019-3700: openssl security, bug fix, and enhancement update (LOW)

больше 5 лет назад
suse-cvrf логотип
openSUSE-SU-2019:1814-1

Security update for virtualbox

почти 6 лет назад

Уязвимостей на страницу