CVE-2019-1563
10.09.2019, 17:15
In situations where an attacker receives automated notification of the success or failure of a decryption attempt an attacker, after sending a very large number of messages to be decrypted, can recover a CMS/PKCS7 transported encryption key or decrypt any RSA encrypted message that was encrypted with the public RSA key, using a Bleichenbacher padding oracle attack. Applications are not affected if they use a certificate together with the private RSA key to the CMS_decrypt or PKCS7_decrypt functions to select the correct recipient info to decrypt. Fixed in OpenSSL 1.1.1d (Affected 1.1.1-1.1.1c). Fixed in OpenSSL 1.1.0l (Affected 1.1.0-1.1.0k). Fixed in OpenSSL 1.0.2t (Affected 1.0.2-1.0.2s).Enginsight
Vendor | Product | Version |
---|---|---|
openssl | openssl | 1.0.2 ≤ 𝑥 ≤ 1.0.2s |
openssl | openssl | 1.1.0 ≤ 𝑥 ≤ 1.1.0k |
openssl | openssl | 1.1.1 ≤ 𝑥 ≤ 1.1.1c |
𝑥
= Vulnerable software versions

Debian Releases

Ubuntu Releases
Ubuntu Product | |||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
edk2 |
| ||||||||||||||||||||||||||||
nodejs |
| ||||||||||||||||||||||||||||
openssl |
| ||||||||||||||||||||||||||||
openssl1.0 |
|
References