Severity
5.9MEDIUM
EPSS
5.0%
top 10.34%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedFeb 27
Latest updateMay 13
Description
If an application encounters a fatal protocol error and then calls SSL_shutdown() twice (once to send a close_notify, and once to receive one) then OpenSSL can respond differently to the calling application if a 0 byte record is received with invalid padding compared to if a 0 byte record is received with an invalid MAC. If the application then behaves differently based on that in a way that is detectable to the remote peer, then this amounts to a padding oracle that could be used to decrypt dat…
CVSS vector
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:NExploitability: 2.2 | Impact: 3.6
Affected Packages52 packages
Also affects: Debian Linux 8.0, 9.0, Fedora 29, 30, 31, Ubuntu Linux 16.04, 18.04, 18.10
Patches
🔴Vulnerability Details
4GHSA▶
GHSA-9ccq-7hvh-cv7p: If an application encounters a fatal protocol error and then calls SSL_shutdown() twice (once to send a close_notify, and once to receive one) then Op↗2022-05-13
OSV▶
CVE-2019-1559: If an application encounters a fatal protocol error and then calls SSL_shutdown() twice (once to send a close_notify, and once to receive one) then Op↗2019-02-27
💥Exploits & PoCs
1📋Vendor Advisories
6Oracle▶
Oracle Oracle Communications Applications Risk Matrix: Platform (OpenSSL) — CVE-2019-1559↗2020-01-15
💬Community
5Bugzilla
▶