First published: Wed Feb 27 2019(Updated: )
Juraj Somorovsky, Robert Merget, and Nimrod Aviram discovered that certain applications incorrectly used OpenSSL and could be exposed to a padding oracle attack. A remote attacker could possibly use this issue to decrypt data.
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
ubuntu/libssl1.0.0 | <1.0.2n-1ubuntu6.2 | 1.0.2n-1ubuntu6.2 |
=18.10 | ||
All of | ||
ubuntu/libssl1.0.0 | <1.0.2n-1ubuntu5.3 | 1.0.2n-1ubuntu5.3 |
=18.04 | ||
All of | ||
ubuntu/libssl1.0.0 | <1.0.2g-1ubuntu4.15 | 1.0.2g-1ubuntu4.15 |
=16.04 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this OpenSSL vulnerability is USN-3899-1.
This OpenSSL vulnerability allows a remote attacker to potentially decrypt data by exploiting a padding oracle attack.
Applications using OpenSSL version 1.0.2n-1ubuntu6.2, 1.0.2n-1ubuntu5.3, and 1.0.2g-1ubuntu4.15 are affected.
A remote attacker can exploit this vulnerability by performing a padding oracle attack.
You can find more information about this OpenSSL vulnerability on the Ubuntu security website using the provided references.