Vulnerability CVE-2019-1563: Information

Description

In situations where an attacker receives automated notification of the success or failure of a decryption attempt an attacker, after sending a very large number of messages to be decrypted, can recover a CMS/PKCS7 transported encryption key or decrypt any RSA encrypted message that was encrypted with the public RSA key, using a Bleichenbacher padding oracle attack. Applications are not affected if they use a certificate together with the private RSA key to the CMS_decrypt or PKCS7_decrypt functions to select the correct recipient info to decrypt. Fixed in OpenSSL 1.1.1d (Affected 1.1.1-1.1.1c). Fixed in OpenSSL 1.1.0l (Affected 1.1.0-1.1.0k). Fixed in OpenSSL 1.0.2t (Affected 1.0.2-1.0.2s).

Severity: LOW (3.7) Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N

Published: Sept. 10, 2019
Modified: Nov. 7, 2023
Error type identifier: CWE-327CWE-203

Fixed packages

Package name
Branch
Fixed in version
Version from repository
Errata ID
Task #
State
openssl1.1sisyphus1.1.1d-alt11.1.1w-alt1ALT-PU-2019-2752-1237852Fixed
openssl1.1p101.1.1d-alt11.1.1w-alt0.p10.1ALT-PU-2019-2752-1237852Fixed
openssl1.1p91.1.1d-alt1.11.1.1u-alt1ALT-PU-2019-2771-1237853Fixed
openssl1.1c10f11.1.1d-alt11.1.1w-alt0.p10.1ALT-PU-2019-2752-1237852Fixed
openssl1.1c9f21.1.1d-alt1.11.1.1w-alt0.p9.1ALT-PU-2019-2771-1237853Fixed
openssl10p91.0.2u-alt1.p9.11.0.2u-alt1.p9.2ALT-PU-2020-3485-1263121Fixed
openssl10p81.0.2u-alt0.M80P.11.0.2u-alt0.M80P.2ALT-PU-2020-3494-1263122Fixed

References to Advisories, Solutions, and Tools

    1. Configuration 1

      cpe:2.3:a:openssl:openssl:*:*:*:*:*:*:*:*
      Start including
      1.1.1
      End including
      1.1.1c

      cpe:2.3:a:openssl:openssl:*:*:*:*:*:*:*:*
      Start including
      1.0.2
      End including
      1.0.2s

      cpe:2.3:a:openssl:openssl:*:*:*:*:*:*:*:*
      Start including
      1.1.0
      End including
      1.1.0k