First published: Fri Sep 13 2019(Updated: )
In situations where an attacker receives automated notification of the success or failure of a decryption attempt an attacker, after sending a very large number of messages to be decrypted, can recover a CMS/PKCS7 transported encryption key or decrypt any RSA encrypted message that was encrypted with the public RSA key, using a Bleichenbacher padding oracle attack. Applications are not affected if they use a certificate together with the private RSA key to the CMS_decrypt or PKCS7_decrypt functions to select the correct recipient info to decrypt. Fixed in OpenSSL 1.1.1d (Affected 1.1.1-1.1.1c). Fixed in OpenSSL 1.1.0l (Affected 1.1.0-1.1.0k). Fixed in OpenSSL 1.0.2t (Affected 1.0.2-1.0.2s). Reference: <a href="https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=08229ad838c50f644d7e928e2eef147b4308ad64">https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=08229ad838c50f644d7e928e2eef147b4308ad64</a> <a href="https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=631f94db0065c78181ca9ba5546ebc8bb3884b97">https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=631f94db0065c78181ca9ba5546ebc8bb3884b97</a> <a href="https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=e21f8cf78a125cd3c8c0d1a1a6c8bb0b901f893f">https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=e21f8cf78a125cd3c8c0d1a1a6c8bb0b901f893f</a> <a href="https://seclists.org/bugtraq/2019/Sep/25">https://seclists.org/bugtraq/2019/Sep/25</a> <a href="https://www.openssl.org/news/secadv/20190910.txt">https://www.openssl.org/news/secadv/20190910.txt</a>
Affected Software | Affected Version | How to fix |
---|---|---|
OpenSSL libcrypto | >=1.1.1<1.1.1c>=1.1.0<1.1.0k>=1.0.2<1.0.2s |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
An attacker can recover a CMS/PKCS7 transported encryption key or decrypt RSA encrypted messages after analyzing the responses to decryption attempts.
OpenSSL versions 1.1.1 to 1.1.1c, 1.1.0 to 1.1.0k, and 1.0.2 to 1.0.2s are vulnerable to REDHAT-BUG-1752100.
To mitigate the risks of REDHAT-BUG-1752100, upgrade OpenSSL to a version that addresses this vulnerability.
Yes, REDHAT-BUG-1752100 specifically affects CMS/PKCS7 encryption and RSA encrypted messages.
If using a vulnerable version identified in REDHAT-BUG-1752100, it is crucial to update to the latest patched version of OpenSSL as soon as possible.