Satheesh575555 / Openssl_1_1_0_CVE-2021-23841

Other
0 stars 0 forks source link

CVE-2019-1563 (Low) detected in multiple libraries #5

Open mend-bolt-for-github[bot] opened 1 year ago

mend-bolt-for-github[bot] commented 1 year ago

CVE-2019-1563 - Low Severity Vulnerability

Vulnerable Libraries - opensslOpenSSL_1_1_0g, opensslOpenSSL_1_1_0g, opensslOpenSSL_1_1_0g, opensslOpenSSL_1_1_0g

Vulnerability Details

In situations where an attacker receives automated notification of the success or failure of a decryption attempt an attacker, after sending a very large number of messages to be decrypted, can recover a CMS/PKCS7 transported encryption key or decrypt any RSA encrypted message that was encrypted with the public RSA key, using a Bleichenbacher padding oracle attack. Applications are not affected if they use a certificate together with the private RSA key to the CMS_decrypt or PKCS7_decrypt functions to select the correct recipient info to decrypt. Fixed in OpenSSL 1.1.1d (Affected 1.1.1-1.1.1c). Fixed in OpenSSL 1.1.0l (Affected 1.1.0-1.1.0k). Fixed in OpenSSL 1.0.2t (Affected 1.0.2-1.0.2s).

Publish Date: 2019-09-10

URL: CVE-2019-1563

CVSS 3 Score Details (3.7)

Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: High - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: Low - Integrity Impact: None - Availability Impact: None

For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Origin: https://www.openssl.org/news/secadv/20190910.txt

Release Date: 2019-09-10

Fix Resolution: 1.0.2t,1.1.0l,1.1.1d


Step up your Open Source Security Game with Mend here