Description
If an application encounters a fatal protocol error and then calls SSL_shutdown() twice (once to send a close_notify, and once to receive one) then OpenSSL can respond differently to the calling application if a 0 byte record is received with invalid padding compared to if a 0 byte record is received with an invalid MAC. If the application then behaves differently based on that in a way that is detectable to the remote peer, then this amounts to a padding oracle that could be used to decrypt data. In order for this to be exploitable "non-stitched" ciphersuites must be in use. Stitched ciphersuites are optimised implementations of certain commonly used ciphersuites. Also the application must call SSL_shutdown() twice even if a protocol error has occurred (applications should not do this but some do anyway). Fixed in OpenSSL 1.0.2r (Affected 1.0.2-1.0.2q).
Published: 2019-02-27
Score: 5.9 Medium
EPSS: 5.0% Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

No analysis available yet.

Remediation

No remediation available yet.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Debian DLA Debian DLA DLA-1701-1 openssl security update
Debian DSA Debian DSA DSA-4400-1 openssl1.0 security update
EUVD EUVD EUVD-2019-10116 If an application encounters a fatal protocol error and then calls SSL_shutdown() twice (once to send a close_notify, and once to receive one) then OpenSSL can respond differently to the calling application if a 0 byte record is received with invalid padding compared to if a 0 byte record is received with an invalid MAC. If the application then behaves differently based on that in a way that is detectable to the remote peer, then this amounts to a padding oracle that could be used to decrypt data. In order for this to be exploitable "non-stitched" ciphersuites must be in use. Stitched ciphersuites are optimised implementations of certain commonly used ciphersuites. Also the application must call SSL_shutdown() twice even if a protocol error has occurred (applications should not do this but some do anyway). Fixed in OpenSSL 1.0.2r (Affected 1.0.2-1.0.2q).
Ubuntu USN Ubuntu USN USN-3899-1 OpenSSL vulnerability
Ubuntu USN Ubuntu USN USN-4376-2 OpenSSL vulnerabilities
References
Link Providers
http://lists.opensuse.org/opensuse-security-announce/2019-03/msg00041.html cve-icon cve-icon
http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00019.html cve-icon cve-icon
http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00046.html cve-icon cve-icon
http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00047.html cve-icon cve-icon
http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00049.html cve-icon cve-icon
http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00080.html cve-icon cve-icon
http://www.securityfocus.com/bid/107174 cve-icon cve-icon
https://access.redhat.com/errata/RHSA-2019:2304 cve-icon cve-icon
https://access.redhat.com/errata/RHSA-2019:2437 cve-icon cve-icon
https://access.redhat.com/errata/RHSA-2019:2439 cve-icon cve-icon
https://access.redhat.com/errata/RHSA-2019:2471 cve-icon cve-icon
https://access.redhat.com/errata/RHSA-2019:3929 cve-icon cve-icon
https://access.redhat.com/errata/RHSA-2019:3931 cve-icon cve-icon
https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=e9bbefbf0f24c57645e7ad6a5a71ae649d18ac8e cve-icon cve-icon
https://github.com/RUB-NDS/TLS-Padding-Oracles cve-icon
https://kc.mcafee.com/corporate/index?page=content&id=SB10282 cve-icon cve-icon
https://lists.debian.org/debian-lts-announce/2019/03/msg00003.html cve-icon cve-icon
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/EWC42UXL5GHTU5G77VKBF6JYUUNGSHOM/ cve-icon cve-icon
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/Y3IVFGSERAZLNJCK35TEM2R4726XIH3Z/ cve-icon cve-icon
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZBEV5QGDRFUZDMNECFXUSN5FMYOZDE4V/ cve-icon cve-icon
https://nvd.nist.gov/vuln/detail/CVE-2019-1559 cve-icon
https://security.gentoo.org/glsa/201903-10 cve-icon cve-icon
https://security.netapp.com/advisory/ntap-20190301-0001/ cve-icon cve-icon
https://security.netapp.com/advisory/ntap-20190301-0002/ cve-icon cve-icon
https://security.netapp.com/advisory/ntap-20190423-0002/ cve-icon cve-icon
https://support.f5.com/csp/article/K18549143 cve-icon cve-icon
https://support.f5.com/csp/article/K18549143?utm_source=f5support&amp%3Butm_medium=RSS cve-icon cve-icon
https://usn.ubuntu.com/3899-1/ cve-icon cve-icon
https://usn.ubuntu.com/4376-2/ cve-icon cve-icon
https://www.cve.org/CVERecord?id=CVE-2019-1559 cve-icon
https://www.debian.org/security/2019/dsa-4400 cve-icon cve-icon
https://www.openssl.org/news/secadv/20190226.txt cve-icon cve-icon cve-icon
https://www.oracle.com/security-alerts/cpujan2020.html cve-icon cve-icon
https://www.oracle.com/security-alerts/cpujan2021.html cve-icon cve-icon
https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html cve-icon cve-icon
https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html cve-icon cve-icon
https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html cve-icon cve-icon
https://www.tenable.com/security/tns-2019-02 cve-icon cve-icon
https://www.tenable.com/security/tns-2019-03 cve-icon cve-icon
History

Sun, 13 Jul 2025 13:45:00 +0000

Type Values Removed Values Added
Metrics epss

{'score': 0.05051}

epss

{'score': 0.04426}


Subscriptions

Canonical Ubuntu Linux
Debian Debian Linux
F5 Big-ip Access Policy Manager Big-ip Advanced Firewall Manager Big-ip Analytics Big-ip Application Acceleration Manager Big-ip Application Security Manager Big-ip Domain Name System Big-ip Edge Gateway Big-ip Fraud Protection Service Big-ip Global Traffic Manager Big-ip Link Controller Big-ip Local Traffic Manager Big-ip Policy Enforcement Manager Big-ip Webaccelerator Big-iq Centralized Management Traffix Signaling Delivery Controller
Fedoraproject Fedora
Mcafee Agent Data Exchange Layer Threat Intelligence Exchange Server Web Gateway
Netapp A220 A220 Firmware A320 A320 Firmware A800 A800 Firmware Active Iq Unified Manager Altavault C190 C190 Firmware Cloud Backup Clustered Data Ontap Antivirus Connector Cn1610 Cn1610 Firmware Element Software Fas2720 Fas2720 Firmware Fas2750 Fas2750 Firmware Hci Compute Node Hci Management Node Hyper Converged Infrastructure Oncommand Insight Oncommand Unified Manager Oncommand Unified Manager Core Package Oncommand Workflow Automation Ontap Select Deploy Ontap Select Deploy Administration Utility Santricity Smi-s Provider Service Processor Smi-s Provider Snapcenter Snapdrive Snapprotect Solidfire Steelstore Cloud Integrated Storage Storage Automation Store Storagegrid
Nodejs Node.js
Openssl Openssl
Opensuse Leap
Oracle Api Gateway Business Intelligence Communications Diameter Signaling Router Communications Performance Intelligence Center Communications Session Border Controller Communications Session Router Communications Unified Session Manager Endeca Server Enterprise Manager Base Platform Enterprise Manager Ops Center Jd Edwards Enterpriseone Tools Jd Edwards World Security Mysql Mysql Enterprise Monitor Mysql Workbench Peoplesoft Enterprise Peopletools Secure Global Desktop Services Tools Bundle
Paloaltonetworks Pan-os
Redhat Ansible Tower Enterprise Linux Enterprise Linux Desktop Enterprise Linux Server Enterprise Linux Workstation Jboss Enterprise Web Server Virtualization Virtualization Host
Tenable Nessus
cve-icon MITRE

Status: PUBLISHED

Assigner: openssl

Published:

Updated: 2024-09-17T04:20:35.057Z

Reserved: 2018-11-28T00:00:00.000Z

Link: CVE-2019-1559

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2019-02-27T23:29:00.277

Modified: 2024-11-21T04:36:48.960

Link: CVE-2019-1559

cve-icon Redhat

Severity : Moderate

Publid Date: 2019-02-26T00:00:00Z

Links: CVE-2019-1559 - Bugzilla

cve-icon OpenCVE Enrichment

No data.

Weaknesses