First published: Tue Jul 30 2019(Updated: )
OpenSSL could allow a local attacker to bypass security restrictions, caused by the building of . mingw programs or Windows programs with world writable path defaults. An attacker could exploit this vulnerability to modify default configuration, insert CA certificates, modify (or even replace) existing engine modules.
Credit: openssl-security@openssl.org
Affected Software | Affected Version | How to fix |
---|---|---|
OpenSSL OpenSSL | >=1.0.2<=1.0.2s | |
OpenSSL OpenSSL | >=1.1.0<=1.1.0k | |
OpenSSL OpenSSL | >=1.1.1<=1.1.1c | |
<=10.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-1552 is a vulnerability in OpenSSL that allows a local attacker to bypass security restrictions caused by the building of .min files.
The severity of CVE-2019-1552 is low, with a severity value of 3.3.
CVE-2019-1552 affects OpenSSL versions 1.0.2s, 1.1.0k, and 1.1.1c.
OPENSSLDIR is a directory in OpenSSL where it can find a configuration file and certificates used for TLS verification.
To fix CVE-2019-1552, update OpenSSL to a version that includes the relevant security patches.