First published: Tue Feb 26 2019(Updated: )
A vulnerability was found in OpenSSL 1.0.2. When an application encounters a fatal protocol error and then calls SSL_shutdown() twice, OpenSSL can respond differently to the calling application if a 0 byte record is received with invalid padding compared to if a 0 byte record is received with an invalid MAC. This difference in behaviour can be detected by a remote peer, then this amounts to a padding oracle that could be used to decrypt data. In order for this to be exploitable "non-stitched" ciphersuites must be in use. Also the application must call SSL_shutdown() twice even if a protocol error has occurred (applications should not do this but some do anyway). AEAD ciphersuites are not impacted. This issue does not impact OpenSSL 1.1.1 or 1.1.0. Upstream bug: <a href="https://www.openssl.org/news/secadv/20190226.txt">https://www.openssl.org/news/secadv/20190226.txt</a> Upstream Patch: <a href="https://github.com/openssl/openssl/commit/e9bbefbf0f24c57645e7ad6a5a71ae649d18ac8e">https://github.com/openssl/openssl/commit/e9bbefbf0f24c57645e7ad6a5a71ae649d18ac8e</a>
Credit: openssl-security@openssl.org openssl-security@openssl.org openssl-security@openssl.org
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/openssl | <0:1.0.1e-58.el6_10 | 0:1.0.1e-58.el6_10 |
redhat/openssl | <1:1.0.2k-19.el7 | 1:1.0.2k-19.el7 |
redhat/jws5-ecj | <0:4.12.0-1.redhat_1.1.el6 | 0:4.12.0-1.redhat_1.1.el6 |
redhat/jws5-javapackages-tools | <0:3.4.1-5.15.11.el6 | 0:3.4.1-5.15.11.el6 |
redhat/jws5-jboss-logging | <0:3.3.2-1.Final_redhat_00001.1.el6 | 0:3.3.2-1.Final_redhat_00001.1.el6 |
redhat/jws5-tomcat | <0:9.0.21-10.redhat_4.1.el6 | 0:9.0.21-10.redhat_4.1.el6 |
redhat/jws5-tomcat-native | <0:1.2.21-34.redhat_34.el6 | 0:1.2.21-34.redhat_34.el6 |
redhat/jws5-tomcat-vault | <0:1.1.8-1.Final_redhat_1.1.el6 | 0:1.1.8-1.Final_redhat_1.1.el6 |
redhat/jws5-ecj | <0:4.12.0-1.redhat_1.1.el7 | 0:4.12.0-1.redhat_1.1.el7 |
redhat/jws5-javapackages-tools | <0:3.4.1-5.15.11.el7 | 0:3.4.1-5.15.11.el7 |
redhat/jws5-jboss-logging | <0:3.3.2-1.Final_redhat_00001.1.el7 | 0:3.3.2-1.Final_redhat_00001.1.el7 |
redhat/jws5-tomcat | <0:9.0.21-10.redhat_4.1.el7 | 0:9.0.21-10.redhat_4.1.el7 |
redhat/jws5-tomcat-native | <0:1.2.21-34.redhat_34.el7 | 0:1.2.21-34.redhat_34.el7 |
redhat/jws5-tomcat-vault | <0:1.1.8-1.Final_redhat_1.1.el7 | 0:1.1.8-1.Final_redhat_1.1.el7 |
redhat/jws5-ecj | <0:4.12.0-1.redhat_1.1.el8 | 0:4.12.0-1.redhat_1.1.el8 |
redhat/jws5-javapackages-tools | <0:3.4.1-5.15.11.el8 | 0:3.4.1-5.15.11.el8 |
redhat/jws5-jboss-logging | <0:3.3.2-1.Final_redhat_00001.1.el8 | 0:3.3.2-1.Final_redhat_00001.1.el8 |
redhat/jws5-tomcat | <0:9.0.21-10.redhat_4.1.el8 | 0:9.0.21-10.redhat_4.1.el8 |
redhat/jws5-tomcat-native | <0:1.2.21-34.redhat_34.el8 | 0:1.2.21-34.redhat_34.el8 |
redhat/jws5-tomcat-vault | <0:1.1.8-1.Final_redhat_1.1.el8 | 0:1.1.8-1.Final_redhat_1.1.el8 |
redhat/imgbased | <0:1.1.9-0.1.el7e | 0:1.1.9-0.1.el7e |
redhat/ovirt-node-ng | <0:4.3.5-0.20190717.0.el7e | 0:4.3.5-0.20190717.0.el7e |
redhat/redhat-release-virtualization-host | <0:4.3.5-2.el7e | 0:4.3.5-2.el7e |
redhat/redhat-virtualization-host | <0:4.3.5-20190722.0.el7_7 | 0:4.3.5-20190722.0.el7_7 |
redhat/rhvm-appliance | <0:4.3-20190722.0.el7 | 0:4.3-20190722.0.el7 |
redhat/openssl | <1.0.2 | 1.0.2 |
IBM Security Verify Governance | <=10.0 | |
debian/openssl | 1.1.1w-0+deb11u1 1.1.1w-0+deb11u2 3.0.15-1~deb12u1 3.0.14-1~deb12u2 3.4.0-2 3.4.1-1 | |
OpenSSL libcrypto | >=1.0.2<1.0.2r | |
Ubuntu | =16.04 | |
Ubuntu | =18.04 | |
Ubuntu | =18.10 | |
Debian | =8.0 | |
Debian | =9.0 | |
netapp active iq unified manager windows | >=7.3 | |
NetApp Active IQ Unified Manager for VMware vSphere | >=9.5 | |
netapp active iq unified manager windows | ||
NetApp AltaVault | ||
netapp cloud backup | ||
netapp clustered data ontap antivirus connector | ||
NetApp Element Software | ||
netapp hci management node | ||
NetApp Hyper Converged Infrastructure | ||
NetApp OnCommand Insight | ||
NetApp OnCommand Unified Manager for Windows | ||
NetApp OnCommand Unified Manager for vSphere | ||
NetApp OnCommand Unified Manager for Windows | ||
NetApp OnCommand Workflow Automation | ||
NetApp ONTAP Select Deploy Utility | ||
NetApp ONTAP Select Deploy | ||
netapp santricity smi-s provider | ||
NetApp Service Processor | ||
netapp smi-s provider | ||
NetApp SnapCenter | ||
NetApp SnapDrive for Unix | ||
netapp snapdrive windows | ||
NetApp SnapProtect | ||
netapp solidfire | ||
NetApp SteelStore | ||
NetApp Storage Automation Store | ||
netapp storagegrid | >=9.0.0<=9.0.4 | |
netapp storagegrid | ||
netapp hci compute node | ||
F5 Access Policy Manager | >=12.1.0<=12.1.5 | |
F5 Access Policy Manager | >=13.0.0<=13.1.3 | |
F5 Access Policy Manager | >=14.0.0<=14.1.2 | |
F5 Access Policy Manager | >=15.0.0<=15.1.0 | |
F5 BIG-IP Advanced Firewall Manager | >=12.1.0<=12.1.5 | |
F5 BIG-IP Advanced Firewall Manager | >=13.0.0<=13.1.3 | |
F5 BIG-IP Advanced Firewall Manager | >=14.0.0<=14.1.2 | |
F5 BIG-IP Advanced Firewall Manager | >=15.0.0<=15.1.0 | |
F5 BIG-IP Analytics | >=12.1.0<=12.1.5 | |
F5 BIG-IP Analytics | >=13.0.0<=13.1.3 | |
F5 BIG-IP Analytics | >=14.0.0<=14.1.2 | |
F5 BIG-IP Analytics | >=15.0.0<=15.1.0 | |
f5 big-ip application acceleration manager | >=12.1.0<=12.1.5 | |
f5 big-ip application acceleration manager | >=13.0.0<=13.1.3 | |
f5 big-ip application acceleration manager | >=14.0.0<=14.1.2 | |
f5 big-ip application acceleration manager | >=15.0.0<=15.1.0 | |
F5 Application Security Manager | >=12.1.0<=12.1.5 | |
F5 Application Security Manager | >=13.0.0<=13.1.3 | |
F5 Application Security Manager | >=14.0.0<=14.1.2 | |
F5 Application Security Manager | >=15.0.0<=15.1.0 | |
f5 big-ip domain name system | >=12.1.0<=12.1.5 | |
f5 big-ip domain name system | >=13.0.0<=13.1.3 | |
f5 big-ip domain name system | >=14.0.0<=14.1.2 | |
f5 big-ip domain name system | >=15.0.0<=15.1.0 | |
F5 BIG-IP Edge Gateway | >=12.1.0<=12.1.5 | |
F5 BIG-IP Edge Gateway | >=13.0.0<=13.1.3 | |
F5 BIG-IP Edge Gateway | >=14.0.0<=14.1.2 | |
F5 BIG-IP Edge Gateway | >=15.0.0<=15.1.0 | |
F5 BIG-IP fraud protection services | >=12.1.0<=12.1.5 | |
F5 BIG-IP fraud protection services | >=13.0.0<=13.1.3 | |
F5 BIG-IP fraud protection services | >=14.0.0<=14.1.2 | |
F5 BIG-IP fraud protection services | >=15.0.0<=15.1.0 | |
F5 BIG-IP Global Traffic Manager | >=12.1.0<=12.1.5 | |
F5 BIG-IP Global Traffic Manager | >=13.0.0<=13.1.3 | |
F5 BIG-IP Global Traffic Manager | >=14.0.0<=14.1.2 | |
F5 BIG-IP Global Traffic Manager | >=15.0.0<=15.1.0 | |
F5 BIG-IP | >=12.1.0<=12.1.5 | |
F5 BIG-IP | >=13.0.0<=13.1.3 | |
F5 BIG-IP | >=14.0.0<=14.1.2 | |
F5 BIG-IP | >=15.0.0<=15.1.0 | |
F5 BIG-IP Local Traffic Manager | >=12.1.0<=12.1.5 | |
F5 BIG-IP Local Traffic Manager | >=13.0.0<=13.1.3 | |
F5 BIG-IP Local Traffic Manager | >=14.0.0<=14.1.2 | |
F5 BIG-IP Local Traffic Manager | >=15.0.0<=15.1.0 | |
F5 BIG-IP Policy Enforcement Manager | >=12.1.0<=12.1.5 | |
F5 BIG-IP Policy Enforcement Manager | >=13.0.0<=13.1.3 | |
F5 BIG-IP Policy Enforcement Manager | >=14.0.0<=14.1.2 | |
F5 BIG-IP Policy Enforcement Manager | >=15.0.0<=15.1.0 | |
F5 BIG-IP WebAccelerator | >=12.1.0<=12.1.5 | |
F5 BIG-IP WebAccelerator | >=13.0.0<=13.1.3 | |
F5 BIG-IP WebAccelerator | >=14.0.0<=14.1.2 | |
F5 BIG-IP WebAccelerator | >=15.0.0<=15.1.0 | |
F5 BIG-IP and BIG-IQ Centralized Management | >=6.0.0<=6.1.0 | |
F5 BIG-IP and BIG-IQ Centralized Management | >=7.0.0<=7.1.0 | |
F5 Traffix Systems Signaling Delivery Controller | >=5.0.0<=5.1.0 | |
F5 Traffix Systems Signaling Delivery Controller | =4.4.0 | |
Tenable Nessus | <=8.2.3 | |
openSUSE | =15.0 | |
openSUSE | =15.1 | |
openSUSE | =42.3 | |
All of | ||
NetApp CN1610 | ||
NetApp CN1610 Firmware | ||
All of | ||
NetApp AFF A320 Firmware | ||
NetApp AFF A320 | ||
All of | ||
NetApp AFF C190 Firmware | ||
NetApp AFF C190 | ||
All of | ||
NetApp AFF A220 Firmware | ||
NetApp AFF A220 | ||
All of | ||
NetApp FAS2700 Firmware | ||
netapp fas2720 | ||
All of | ||
NetApp FAS2700 Firmware | ||
netapp fas2750 | ||
All of | ||
NetApp AFF A800 Firmware | ||
NetApp AFF A800 | ||
Fedora | =29 | |
Fedora | =30 | |
Fedora | =31 | |
Mcafee Agent | >=5.6.0<=5.6.4 | |
McAfee Data eXchange Layer | >=4.0.0<6.0.0 | |
McAfee Threat Intelligence Exchange Server | >=2.0.0<3.0.0 | |
McAfee Web Gateway | >=7.0.0<9.0.0 | |
All of | ||
Red Hat JBoss Enterprise Web Server | =5.0.0 | |
Any of | ||
Red Hat Enterprise Linux | =6.0 | |
Red Hat Enterprise Linux | =7.0 | |
Red Hat Enterprise Linux | =8.0 | |
All of | ||
Any of | ||
Red Hat Enterprise Virtualization | =4.0 | |
redhat virtualization host | =4.0 | |
Red Hat Enterprise Linux | =7.0 | |
redhat enterprise Linux desktop | =6.0 | |
redhat enterprise Linux desktop | =7.0 | |
redhat enterprise Linux server | =6.0 | |
redhat enterprise Linux server | =7.0 | |
redhat enterprise Linux workstation | =6.0 | |
redhat enterprise Linux workstation | =7.0 | |
Oracle API Gateway | =11.1.2.4.0 | |
Oracle Business Intelligence Enterprise Edition | =11.1.1.9.0 | |
Oracle Business Intelligence Enterprise Edition | =12.2.1.3.0 | |
Oracle Business Intelligence Enterprise Edition | =12.2.1.4.0 | |
Oracle Communications Diameter Signaling Router | =8.0.0 | |
Oracle Communications Diameter Signaling Router | =8.1 | |
Oracle Communications Diameter Signaling Router | =8.2 | |
Oracle Communications Diameter Signaling Router | =8.3 | |
Oracle Communications Diameter Signaling Router | =8.4 | |
Oracle Communications Performance Intelligence Center | =10.4.0.2 | |
Oracle Communications Session Border Controller | =7.4 | |
Oracle Communications Session Border Controller | =8.0.0 | |
Oracle Communications Session Border Controller | =8.1.0 | |
Oracle Communications Session Border Controller | =8.2 | |
Oracle Communications Session Border Controller | =8.3 | |
oracle communications session router | =7.4 | |
oracle communications session router | =8.0 | |
oracle communications session router | =8.1 | |
oracle communications session router | =8.2 | |
oracle communications session router | =8.3 | |
oracle communications unified session manager | =7.3.5 | |
oracle communications unified session manager | =8.2.5 | |
Oracle Endeca Server | =7.7.0 | |
Oracle Enterprise Manager Base Platform | =12.1.0.5.0 | |
Oracle Enterprise Manager Base Platform | =13.2.0.0.0 | |
Oracle Enterprise Manager Base Platform | =13.3.0.0.0 | |
Oracle Enterprise Manager Ops Center | =12.3.3 | |
Oracle Enterprise Manager Ops Center | =12.4.0 | |
Oracle JD Edwards EnterpriseOne Tools | =9.2 | |
oracle jd edwards world security | =a9.3 | |
oracle jd edwards world security | =a9.3.1 | |
oracle jd edwards world security | =a9.4 | |
MySQL | >=5.6.0<=5.6.43 | |
MySQL | >=5.7.0<=5.7.25 | |
MySQL | >=8.0.0<=8.0.15 | |
MySQL Enterprise Monitor | <=4.0.8 | |
MySQL Enterprise Monitor | >=8.0.0<=8.0.14 | |
oracle mysql workbench | <=8.0.16 | |
Oracle PeopleSoft Enterprise PeopleTools | =8.55 | |
Oracle PeopleSoft Enterprise PeopleTools | =8.56 | |
Oracle PeopleSoft Enterprise PeopleTools | =8.57 | |
Oracle Secure Global Desktop | =5.4 | |
oracle services tools bundle | =19.2 | |
Palo Alto Networks PAN-OS | >=7.1.0<7.1.15 | |
Palo Alto Networks PAN-OS | >=8.0.0<8.0.20 | |
Palo Alto Networks PAN-OS | >=8.1.0<8.1.8 | |
Palo Alto Networks PAN-OS | >=9.0.0<9.0.2 | |
Node.js | >=6.0.0<=6.8.1 | |
Node.js | >=6.9.0<6.17.0 | |
Node.js | >=8.0.0<=8.8.1 | |
Node.js | >=8.9.0<8.15.1 | |
NetApp CN1610 | ||
NetApp CN1610 Firmware | ||
NetApp AFF A320 Firmware | ||
NetApp AFF A320 | ||
NetApp AFF C190 Firmware | ||
NetApp AFF C190 | ||
NetApp AFF A220 Firmware | ||
NetApp AFF A220 | ||
NetApp FAS2700 Firmware | ||
netapp fas2720 | ||
NetApp FAS2700 Firmware | ||
netapp fas2750 | ||
NetApp AFF A800 Firmware | ||
NetApp AFF A800 | ||
Red Hat JBoss Enterprise Web Server | =5.0.0 | |
Red Hat Enterprise Linux | =6.0 | |
Red Hat Enterprise Linux | =7.0 | |
Red Hat Enterprise Linux | =8.0 | |
Red Hat Enterprise Virtualization | =4.0 | |
redhat virtualization host | =4.0 |
As a workaround you can disable SHA384 if applications (compiled with OpenSSL) allow for adjustment of the ciphersuite string configuration.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Appears in the following advisories)
CVE-2019-1559 has a medium severity rating due to its potential for denial of service.
To fix CVE-2019-1559, upgrade to the latest version of OpenSSL as specified in the available updates.
CVE-2019-1559 affects OpenSSL versions prior to 1.0.2r.
Applications that use OpenSSL for SSL/TLS connections are impacted by CVE-2019-1559.
CVE-2019-1559 is not classified as critical; it is ranked medium due to specific exploitation conditions.