diff --git a/2019/1xxx/CVE-2019-1559.json b/2019/1xxx/CVE-2019-1559.json index 592d20ccc9d..f14b5f92335 100644 --- a/2019/1xxx/CVE-2019-1559.json +++ b/2019/1xxx/CVE-2019-1559.json @@ -1,82 +1,82 @@ { - "CVE_data_meta": { - "ASSIGNER": "openssl-security@openssl.org", - "DATE_PUBLIC": "2019-02-26", - "ID": "CVE-2019-1559", - "STATE": "PUBLIC", - "TITLE": "0-byte record padding oracle" - }, - "affects": { - "vendor": { - "vendor_data": [ - { - "product": { - "product_data": [ - { - "product_name": "OpenSSL", - "version": { - "version_data": [ - { - "version_value": "Fixed in OpenSSL 1.0.2r (Affected 1.0.2-1.0.2q)" - } - ] - } - } - ] - }, - "vendor_name": "OpenSSL" - } + "CVE_data_meta" : { + "ASSIGNER" : "openssl-security@openssl.org", + "DATE_PUBLIC" : "2019-02-26", + "ID" : "CVE-2019-1559", + "STATE" : "PUBLIC", + "TITLE" : "0-byte record padding oracle" + }, + "affects" : { + "vendor" : { + "vendor_data" : [ + { + "product" : { + "product_data" : [ + { + "product_name" : "OpenSSL", + "version" : { + "version_data" : [ + { + "version_value" : "Fixed in OpenSSL 1.0.2r (Affected 1.0.2-1.0.2q)" + } + ] + } + } + ] + }, + "vendor_name" : "OpenSSL" + } + ] + } + }, + "credit" : [ + { + "lang" : "eng", + "value" : "Juraj Somorovsky, Robert Merget and Nimrod Aviram, with additional investigation by Steven Collison and Andrew Hourselt" + } + ], + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "If an application encounters a fatal protocol error and then calls SSL_shutdown() twice (once to send a close_notify, and once to receive one) then OpenSSL can respond differently to the calling application if a 0 byte record is received with invalid padding compared to if a 0 byte record is received with an invalid MAC. If the application then behaves differently based on that in a way that is detectable to the remote peer, then this amounts to a padding oracle that could be used to decrypt data. In order for this to be exploitable \"non-stitched\" ciphersuites must be in use. Stitched ciphersuites are optimised implementations of certain commonly used ciphersuites. Also the application must call SSL_shutdown() twice even if a protocol error has occurred (applications should not do this but some do anyway). Fixed in OpenSSL 1.0.2r (Affected 1.0.2-1.0.2q)." + } + ] + }, + "impact" : [ + { + "lang" : "eng", + "url" : "https://www.openssl.org/policies/secpolicy.html#Moderate", + "value" : "Moderate" + } + ], + "problemtype" : { + "problemtype_data" : [ + { + "description" : [ + { + "lang" : "eng", + "value" : "Padding Oracle" + } ] - } - }, - "credit": [ - { - "lang": "eng", - "value": "Juraj Somorovsky, Robert Merget and Nimrod Aviram, with additional investigation by Steven Collison and Andrew Hourselt" - } - ], - "data_format": "MITRE", - "data_type": "CVE", - "data_version": "4.0", - "description": { - "description_data": [ - { - "lang": "eng", - "value": "If an application encounters a fatal protocol error and then calls SSL_shutdown() twice (once to send a close_notify, and once to receive one) then OpenSSL can respond differently to the calling application if a 0 byte record is received with invalid padding compared to if a 0 byte record is received with an invalid MAC. If the application then behaves differently based on that in a way that is detectable to the remote peer, then this amounts to a padding oracle that could be used to decrypt data. In order for this to be exploitable \"non-stitched\" ciphersuites must be in use. Stitched ciphersuites are optimised implementations of certain commonly used ciphersuites. Also the application must call SSL_shutdown() twice even if a protocol error has occurred (applications should not do this but some do anyway). Fixed in OpenSSL 1.0.2r (Affected 1.0.2-1.0.2q)." - } - ] - }, - "impact": [ - { - "lang": "eng", - "url": "https://www.openssl.org/policies/secpolicy.html#Moderate", - "value": "Moderate" - } - ], - "problemtype": { - "problemtype_data": [ - { - "description": [ - { - "lang": "eng", - "value": "Padding Oracle" - } - ] - } - ] - }, - "references": { - "reference_data": [ - { - "name": "https://www.openssl.org/news/secadv/20190226.txt", - "refsource": "CONFIRM", - "url": "https://www.openssl.org/news/secadv/20190226.txt" - }, - { - "name": "https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=e9bbefbf0f24c57645e7ad6a5a71ae649d18ac8e", - "refsource": "CONFIRM", - "url": "https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=e9bbefbf0f24c57645e7ad6a5a71ae649d18ac8e" - } - ] - } -} \ No newline at end of file + } + ] + }, + "references" : { + "reference_data" : [ + { + "name" : "https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=e9bbefbf0f24c57645e7ad6a5a71ae649d18ac8e", + "refsource" : "CONFIRM", + "url" : "https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=e9bbefbf0f24c57645e7ad6a5a71ae649d18ac8e" + }, + { + "name" : "https://www.openssl.org/news/secadv/20190226.txt", + "refsource" : "CONFIRM", + "url" : "https://www.openssl.org/news/secadv/20190226.txt" + } + ] + } +} diff --git a/2019/5xxx/CVE-2019-5665.json b/2019/5xxx/CVE-2019-5665.json index 8b2ac1fb412..8a36d933295 100644 --- a/2019/5xxx/CVE-2019-5665.json +++ b/2019/5xxx/CVE-2019-5665.json @@ -54,6 +54,8 @@ "references" : { "reference_data" : [ { + "name" : "https://nvidia.custhelp.com/app/answers/detail/a_id/4772", + "refsource" : "CONFIRM", "url" : "https://nvidia.custhelp.com/app/answers/detail/a_id/4772" } ] diff --git a/2019/5xxx/CVE-2019-5666.json b/2019/5xxx/CVE-2019-5666.json index 41f768f4cc5..1ce2c8a95f9 100644 --- a/2019/5xxx/CVE-2019-5666.json +++ b/2019/5xxx/CVE-2019-5666.json @@ -54,6 +54,8 @@ "references" : { "reference_data" : [ { + "name" : "https://nvidia.custhelp.com/app/answers/detail/a_id/4772", + "refsource" : "CONFIRM", "url" : "https://nvidia.custhelp.com/app/answers/detail/a_id/4772" } ] diff --git a/2019/5xxx/CVE-2019-5667.json b/2019/5xxx/CVE-2019-5667.json index cb3ef51dc5f..ebb7dcd9f5a 100644 --- a/2019/5xxx/CVE-2019-5667.json +++ b/2019/5xxx/CVE-2019-5667.json @@ -54,6 +54,8 @@ "references" : { "reference_data" : [ { + "name" : "https://nvidia.custhelp.com/app/answers/detail/a_id/4772", + "refsource" : "CONFIRM", "url" : "https://nvidia.custhelp.com/app/answers/detail/a_id/4772" } ] diff --git a/2019/5xxx/CVE-2019-5668.json b/2019/5xxx/CVE-2019-5668.json index 01618aec4bf..67ac58973fb 100644 --- a/2019/5xxx/CVE-2019-5668.json +++ b/2019/5xxx/CVE-2019-5668.json @@ -54,6 +54,8 @@ "references" : { "reference_data" : [ { + "name" : "https://nvidia.custhelp.com/app/answers/detail/a_id/4772", + "refsource" : "CONFIRM", "url" : "https://nvidia.custhelp.com/app/answers/detail/a_id/4772" } ] diff --git a/2019/5xxx/CVE-2019-5669.json b/2019/5xxx/CVE-2019-5669.json index 1b483329a92..f9b5a66a264 100644 --- a/2019/5xxx/CVE-2019-5669.json +++ b/2019/5xxx/CVE-2019-5669.json @@ -54,6 +54,8 @@ "references" : { "reference_data" : [ { + "name" : "https://nvidia.custhelp.com/app/answers/detail/a_id/4772", + "refsource" : "CONFIRM", "url" : "https://nvidia.custhelp.com/app/answers/detail/a_id/4772" } ] diff --git a/2019/5xxx/CVE-2019-5670.json b/2019/5xxx/CVE-2019-5670.json index 35076a512f6..d41d290884c 100644 --- a/2019/5xxx/CVE-2019-5670.json +++ b/2019/5xxx/CVE-2019-5670.json @@ -54,6 +54,8 @@ "references" : { "reference_data" : [ { + "name" : "https://nvidia.custhelp.com/app/answers/detail/a_id/4772", + "refsource" : "CONFIRM", "url" : "https://nvidia.custhelp.com/app/answers/detail/a_id/4772" } ] diff --git a/2019/5xxx/CVE-2019-5671.json b/2019/5xxx/CVE-2019-5671.json index 30c19c60213..dd80b4ad129 100644 --- a/2019/5xxx/CVE-2019-5671.json +++ b/2019/5xxx/CVE-2019-5671.json @@ -54,6 +54,8 @@ "references" : { "reference_data" : [ { + "name" : "https://nvidia.custhelp.com/app/answers/detail/a_id/4772", + "refsource" : "CONFIRM", "url" : "https://nvidia.custhelp.com/app/answers/detail/a_id/4772" } ]