Уязвимость CVE-2019-1551: Информация

Описание

There is an overflow bug in the x64_64 Montgomery squaring procedure used in exponentiation with 512-bit moduli. No EC algorithms are affected. Analysis suggests that attacks against 2-prime RSA1024, 3-prime RSA1536, and DSA1024 as a result of this defect would be very difficult to perform and are not believed likely. Attacks against DH512 are considered just feasible. However, for an attack the target would have to re-use the DH512 private key, which is not recommended anyway. Also applications directly using the low level API BN_mod_exp may be affected if they use BN_FLG_CONSTTIME. Fixed in OpenSSL 1.1.1e (Affected 1.1.1-1.1.1d). Fixed in OpenSSL 1.0.2u (Affected 1.0.2-1.0.2t).

Важность: MEDIUM (5,3) Вектор: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N

Опубликовано: 6 декабря 2019 г.
Изменено: 7 ноября 2023 г.
Идентификатор типа ошибки: CWE-190

Исправленные пакеты

Имя пакета
Ветка
Исправлено в версии
Версия в репозитории
Errata ID
№ Задания
Состояние
openssl1.1sisyphus1.1.1g-alt11.1.1w-alt1ALT-PU-2020-1879-1249982Исправлено
openssl1.1p101.1.1g-alt11.1.1w-alt0.p10.1ALT-PU-2020-1879-1249982Исправлено
openssl1.1p91.1.1g-alt11.1.1u-alt1ALT-PU-2020-1892-1250580Исправлено
openssl1.1c10f11.1.1g-alt11.1.1w-alt0.p10.1ALT-PU-2020-1879-1249982Исправлено
openssl1.1c9f21.1.1g-alt11.1.1w-alt0.p9.1ALT-PU-2020-1892-1250580Исправлено
openssl10p91.0.2u-alt1.p9.11.0.2u-alt1.p9.2ALT-PU-2020-3485-1263121Исправлено
openssl10p81.0.2u-alt0.M80P.11.0.2u-alt0.M80P.2ALT-PU-2020-3494-1263122Исправлено

Ссылки на рекомендации, решения и инструменты

Ссылка
Ресурс
https://www.openssl.org/news/secadv/20191206.txt
  • Vendor Advisory
https://security.netapp.com/advisory/ntap-20191210-0001/
  • Third Party Advisory
20191225 [slackware-security] openssl (SSA:2019-354-01)
  • Mailing List
  • Third Party Advisory
http://packetstormsecurity.com/files/155754/Slackware-Security-Advisory-openssl-Updates.html
  • Third Party Advisory
  • VDB Entry
DSA-4594
  • Third Party Advisory
20191229 [SECURITY] [DSA 4594-1] openssl1.0 security update
  • Mailing List
  • Third Party Advisory
https://www.tenable.com/security/tns-2019-09
  • Third Party Advisory
openSUSE-SU-2020:0062
  • Mailing List
  • Third Party Advisory
GLSA-202004-10
  • Third Party Advisory
https://www.tenable.com/security/tns-2020-03
  • Third Party Advisory
USN-4376-1
  • Third Party Advisory
https://www.oracle.com/security-alerts/cpujul2020.html
  • Patch
  • Third Party Advisory
USN-4504-1
  • Third Party Advisory
https://www.tenable.com/security/tns-2020-11
  • Third Party Advisory
https://www.oracle.com/security-alerts/cpujan2021.html
  • Patch
  • Third Party Advisory
DSA-4855
  • Third Party Advisory
https://www.tenable.com/security/tns-2021-10
  • Third Party Advisory
https://www.oracle.com/security-alerts/cpuApr2021.html
  • Patch
  • Third Party Advisory
[debian-lts-announce] 20220317 [SECURITY] [DLA 2952-1] openssl security update
  • Mailing List
  • Third Party Advisory
FEDORA-2020-fcc91a28e8
    FEDORA-2020-da2d1ef2d7
      FEDORA-2020-d7b29838f6
        https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=419102400a2811582a7a3d4a4e317d72e5ce0a8f
          https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=f1c5eea8a817075d31e43f5876993c6710238c98
              1. Конфигурация 1

                cpe:2.3:a:openssl:openssl:*:*:*:*:*:*:*:*
                Start including
                1.1.1
                End including
                1.1.1d

                cpe:2.3:a:openssl:openssl:*:*:*:*:*:*:*:*
                Start including
                1.0.2
                End including
                1.0.2t

                Конфигурация 2

                cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*

                Конфигурация 3

                cpe:2.3:a:oracle:peoplesoft_enterprise_peopletools:8.56:*:*:*:*:*:*:*

                cpe:2.3:a:oracle:peoplesoft_enterprise_peopletools:8.57:*:*:*:*:*:*:*

                cpe:2.3:a:oracle:peoplesoft_enterprise_peopletools:8.58:*:*:*:*:*:*:*

                cpe:2.3:a:oracle:mysql_enterprise_monitor:*:*:*:*:*:*:*:*
                End including
                4.0.12

                cpe:2.3:a:oracle:mysql_enterprise_monitor:*:*:*:*:*:*:*:*
                Start including
                8.0.0
                End including
                8.0.20

                cpe:2.3:a:oracle:enterprise_manager_ops_center:12.4.0.0:*:*:*:*:*:*:*

                Конфигурация 4

                cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*

                cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*

                cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*

                Конфигурация 5

                cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*

                cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*

                cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*

                Конфигурация 6

                cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*

                cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*

                Конфигурация 7

                cpe:2.3:a:tenable:log_correlation_engine:*:*:*:*:*:*:*:*
                End excliding
                6.0.9