mirror of
https://github.com/0xMarcio/cve.git
synced 2025-05-29 01:31:01 +00:00
41 lines
2.4 KiB
Markdown
41 lines
2.4 KiB
Markdown
![]() |
### [CVE-2019-1563](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1563)
|
||
|

|
||
|

|
||
|

|
||
|
|
||
|
### Description
|
||
|
|
||
|
In situations where an attacker receives automated notification of the success or failure of a decryption attempt an attacker, after sending a very large number of messages to be decrypted, can recover a CMS/PKCS7 transported encryption key or decrypt any RSA encrypted message that was encrypted with the public RSA key, using a Bleichenbacher padding oracle attack. Applications are not affected if they use a certificate together with the private RSA key to the CMS_decrypt or PKCS7_decrypt functions to select the correct recipient info to decrypt. Fixed in OpenSSL 1.1.1d (Affected 1.1.1-1.1.1c). Fixed in OpenSSL 1.1.0l (Affected 1.1.0-1.1.0k). Fixed in OpenSSL 1.0.2t (Affected 1.0.2-1.0.2s).
|
||
|
|
||
|
### POC
|
||
|
|
||
|
#### Reference
|
||
|
- http://packetstormsecurity.com/files/154467/Slackware-Security-Advisory-openssl-Updates.html
|
||
|
- https://kc.mcafee.com/corporate/index?page=content&id=SB10365
|
||
|
- https://seclists.org/bugtraq/2019/Oct/1
|
||
|
- https://www.oracle.com/security-alerts/cpuapr2020.html
|
||
|
- https://www.oracle.com/security-alerts/cpujan2020.html
|
||
|
- https://www.oracle.com/security-alerts/cpujul2020.html
|
||
|
- https://www.oracle.com/security-alerts/cpuoct2020.html
|
||
|
- https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html
|
||
|
|
||
|
#### Github
|
||
|
- https://github.com/ARPSyndicate/cvemon
|
||
|
- https://github.com/Dashrath158/CVE-Management-App-using-Flask
|
||
|
- https://github.com/Mohzeela/external-secret
|
||
|
- https://github.com/arindam0310018/04-Apr-2022-DevOps__Scan-Images-In-ACR-Using-Trivy
|
||
|
- https://github.com/chnzzh/OpenSSL-CVE-lib
|
||
|
- https://github.com/djschleen/ash
|
||
|
- https://github.com/fredrkl/trivy-demo
|
||
|
- https://github.com/jntass/TASSL-1.1.1k
|
||
|
- https://github.com/mrodden/vyger
|
||
|
- https://github.com/siddharthraopotukuchi/trivy
|
||
|
- https://github.com/simiyo/trivy
|
||
|
- https://github.com/t31m0/Vulnerability-Scanner-for-Containers
|
||
|
- https://github.com/thecyberbaby/Trivy-by-AquaSecurity
|
||
|
- https://github.com/thecyberbaby/Trivy-by-aquaSecurity
|
||
|
- https://github.com/tlsresearch/TSI
|
||
|
- https://github.com/umahari/security
|
||
|
- https://github.com/vinamra28/tekton-image-scan-trivy
|
||
|
|