cve/2019/CVE-2019-1563.md

49 lines
2.9 KiB
Markdown
Raw Normal View History

2024-05-26 14:27:05 +02:00
### [CVE-2019-1563](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1563)
![](https://img.shields.io/static/v1?label=Product&message=OpenSSL&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Vulnerability&message=Padding%20Oracle&color=brighgreen)
### Description
In situations where an attacker receives automated notification of the success or failure of a decryption attempt an attacker, after sending a very large number of messages to be decrypted, can recover a CMS/PKCS7 transported encryption key or decrypt any RSA encrypted message that was encrypted with the public RSA key, using a Bleichenbacher padding oracle attack. Applications are not affected if they use a certificate together with the private RSA key to the CMS_decrypt or PKCS7_decrypt functions to select the correct recipient info to decrypt. Fixed in OpenSSL 1.1.1d (Affected 1.1.1-1.1.1c). Fixed in OpenSSL 1.1.0l (Affected 1.1.0-1.1.0k). Fixed in OpenSSL 1.0.2t (Affected 1.0.2-1.0.2s).
### POC
#### Reference
- http://packetstormsecurity.com/files/154467/Slackware-Security-Advisory-openssl-Updates.html
2024-06-09 00:33:16 +00:00
- http://packetstormsecurity.com/files/154467/Slackware-Security-Advisory-openssl-Updates.html
2024-05-26 14:27:05 +02:00
- https://kc.mcafee.com/corporate/index?page=content&id=SB10365
2024-06-09 00:33:16 +00:00
- https://kc.mcafee.com/corporate/index?page=content&id=SB10365
2024-05-26 14:27:05 +02:00
- https://seclists.org/bugtraq/2019/Oct/1
2024-06-09 00:33:16 +00:00
- https://seclists.org/bugtraq/2019/Oct/1
2024-05-26 14:27:05 +02:00
- https://www.oracle.com/security-alerts/cpuapr2020.html
2024-06-09 00:33:16 +00:00
- https://www.oracle.com/security-alerts/cpuapr2020.html
2024-05-26 14:27:05 +02:00
- https://www.oracle.com/security-alerts/cpujan2020.html
2024-06-09 00:33:16 +00:00
- https://www.oracle.com/security-alerts/cpujan2020.html
2024-05-26 14:27:05 +02:00
- https://www.oracle.com/security-alerts/cpujul2020.html
2024-06-09 00:33:16 +00:00
- https://www.oracle.com/security-alerts/cpujul2020.html
2024-05-26 14:27:05 +02:00
- https://www.oracle.com/security-alerts/cpuoct2020.html
2024-06-09 00:33:16 +00:00
- https://www.oracle.com/security-alerts/cpuoct2020.html
2024-05-26 14:27:05 +02:00
- https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html
2024-06-09 00:33:16 +00:00
- https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html
2024-05-26 14:27:05 +02:00
#### Github
- https://github.com/ARPSyndicate/cvemon
- https://github.com/Dashrath158/CVE-Management-App-using-Flask
- https://github.com/Mohzeela/external-secret
- https://github.com/arindam0310018/04-Apr-2022-DevOps__Scan-Images-In-ACR-Using-Trivy
- https://github.com/chnzzh/OpenSSL-CVE-lib
- https://github.com/djschleen/ash
- https://github.com/fredrkl/trivy-demo
- https://github.com/jntass/TASSL-1.1.1k
- https://github.com/mrodden/vyger
- https://github.com/siddharthraopotukuchi/trivy
- https://github.com/simiyo/trivy
- https://github.com/t31m0/Vulnerability-Scanner-for-Containers
- https://github.com/thecyberbaby/Trivy-by-AquaSecurity
- https://github.com/thecyberbaby/Trivy-by-aquaSecurity
- https://github.com/tlsresearch/TSI
- https://github.com/umahari/security
- https://github.com/vinamra28/tekton-image-scan-trivy