Description
If an application encounters a fatal protocol error and then calls SSL_shutdown() twice (once to send a close_notify, and once to receive one) then OpenSSL can respond differently to the calling application if a 0 byte record is received with invalid padding compared to if a 0 byte record is received with an invalid MAC. If the application then behaves differently based on that in a way that is detectable to the remote peer, then this amounts to a padding oracle that could be used to decrypt data. In order for this to be exploitable "non-stitched" ciphersuites must be in use. Stitched ciphersuites are optimised implementations of certain commonly used ciphersuites. Also the application must call SSL_shutdown() twice even if a protocol error has occurred (applications should not do this but some do anyway). Fixed in OpenSSL 1.0.2r (Affected 1.0.2-1.0.2q).
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-1701-1 | openssl security update |
Debian DSA |
DSA-4400-1 | openssl1.0 security update |
EUVD |
EUVD-2019-10116 | If an application encounters a fatal protocol error and then calls SSL_shutdown() twice (once to send a close_notify, and once to receive one) then OpenSSL can respond differently to the calling application if a 0 byte record is received with invalid padding compared to if a 0 byte record is received with an invalid MAC. If the application then behaves differently based on that in a way that is detectable to the remote peer, then this amounts to a padding oracle that could be used to decrypt data. In order for this to be exploitable "non-stitched" ciphersuites must be in use. Stitched ciphersuites are optimised implementations of certain commonly used ciphersuites. Also the application must call SSL_shutdown() twice even if a protocol error has occurred (applications should not do this but some do anyway). Fixed in OpenSSL 1.0.2r (Affected 1.0.2-1.0.2q). |
Ubuntu USN |
USN-3899-1 | OpenSSL vulnerability |
Ubuntu USN |
USN-4376-2 | OpenSSL vulnerabilities |
References
History
Sun, 13 Jul 2025 13:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
epss
|
epss
|
Subscriptions
Canonical
Subscribe
Ubuntu Linux
Subscribe
Debian
Subscribe
Debian Linux
Subscribe
F5
Subscribe
Big-ip Access Policy Manager
Subscribe
Big-ip Advanced Firewall Manager
Subscribe
Big-ip Analytics
Subscribe
Big-ip Application Acceleration Manager
Subscribe
Big-ip Application Security Manager
Subscribe
Big-ip Domain Name System
Subscribe
Big-ip Edge Gateway
Subscribe
Big-ip Fraud Protection Service
Subscribe
Big-ip Global Traffic Manager
Subscribe
Big-ip Link Controller
Subscribe
Big-ip Local Traffic Manager
Subscribe
Big-ip Policy Enforcement Manager
Subscribe
Big-ip Webaccelerator
Subscribe
Big-iq Centralized Management
Subscribe
Traffix Signaling Delivery Controller
Subscribe
Fedoraproject
Subscribe
Fedora
Subscribe
Mcafee
Subscribe
Agent
Subscribe
Data Exchange Layer
Subscribe
Threat Intelligence Exchange Server
Subscribe
Web Gateway
Subscribe
Netapp
Subscribe
A220
Subscribe
A220 Firmware
Subscribe
A320
Subscribe
A320 Firmware
Subscribe
A800
Subscribe
A800 Firmware
Subscribe
Active Iq Unified Manager
Subscribe
Altavault
Subscribe
C190
Subscribe
C190 Firmware
Subscribe
Cloud Backup
Subscribe
Clustered Data Ontap Antivirus Connector
Subscribe
Cn1610
Subscribe
Cn1610 Firmware
Subscribe
Element Software
Subscribe
Fas2720
Subscribe
Fas2720 Firmware
Subscribe
Fas2750
Subscribe
Fas2750 Firmware
Subscribe
Hci Compute Node
Subscribe
Hci Management Node
Subscribe
Hyper Converged Infrastructure
Subscribe
Oncommand Insight
Subscribe
Oncommand Unified Manager
Subscribe
Oncommand Unified Manager Core Package
Subscribe
Oncommand Workflow Automation
Subscribe
Ontap Select Deploy
Subscribe
Ontap Select Deploy Administration Utility
Subscribe
Santricity Smi-s Provider
Subscribe
Service Processor
Subscribe
Smi-s Provider
Subscribe
Snapcenter
Subscribe
Snapdrive
Subscribe
Snapprotect
Subscribe
Solidfire
Subscribe
Steelstore Cloud Integrated Storage
Subscribe
Storage Automation Store
Subscribe
Storagegrid
Subscribe
Nodejs
Subscribe
Node.js
Subscribe
Openssl
Subscribe
Openssl
Subscribe
Opensuse
Subscribe
Leap
Subscribe
Oracle
Subscribe
Api Gateway
Subscribe
Business Intelligence
Subscribe
Communications Diameter Signaling Router
Subscribe
Communications Performance Intelligence Center
Subscribe
Communications Session Border Controller
Subscribe
Communications Session Router
Subscribe
Communications Unified Session Manager
Subscribe
Endeca Server
Subscribe
Enterprise Manager Base Platform
Subscribe
Enterprise Manager Ops Center
Subscribe
Jd Edwards Enterpriseone Tools
Subscribe
Jd Edwards World Security
Subscribe
Mysql
Subscribe
Mysql Enterprise Monitor
Subscribe
Mysql Workbench
Subscribe
Peoplesoft Enterprise Peopletools
Subscribe
Secure Global Desktop
Subscribe
Services Tools Bundle
Subscribe
Paloaltonetworks
Subscribe
Pan-os
Subscribe
Redhat
Subscribe
Ansible Tower
Subscribe
Enterprise Linux
Subscribe
Enterprise Linux Desktop
Subscribe
Enterprise Linux Server
Subscribe
Enterprise Linux Workstation
Subscribe
Jboss Enterprise Web Server
Subscribe
Virtualization
Subscribe
Virtualization Host
Subscribe
Tenable
Subscribe
Nessus
Subscribe
Status: PUBLISHED
Assigner: openssl
Published:
Updated: 2024-09-17T04:20:35.057Z
Reserved: 2018-11-28T00:00:00.000Z
Link: CVE-2019-1559
No data.
Status : Modified
Published: 2019-02-27T23:29:00.277
Modified: 2024-11-21T04:36:48.960
Link: CVE-2019-1559
OpenCVE Enrichment
No data.
Debian DLA
Debian DSA
EUVD
Ubuntu USN