If an application encounters a fatal protocol error and then calls SSL_shutdown() twice (once to send a close_notify, and once to receive one) then OpenSSL can respond differently to the calling application if a 0 byte record is received with invalid padding compared to if a 0 byte record is received with an invalid MAC. If the application then behaves differently based on that in a way that is detectable to the remote peer, then this amounts to a padding oracle that could be used to decrypt data. In order for this to be exploitable "non-stitched" ciphersuites must be in use. Stitched ciphersuites are optimised implementations of certain commonly used ciphersuites. Also the application must call SSL_shutdown() twice even if a protocol error has occurred (applications should not do this but some do anyway). Fixed in OpenSSL 1.0.2r (Affected 1.0.2-1.0.2q).
Project Subscriptions
| Vendors | Products |
|---|---|
|
Canonical
Subscribe
|
Ubuntu Linux
Subscribe
|
|
Debian
Subscribe
|
Debian Linux
Subscribe
|
|
F5
Subscribe
|
Big-ip Access Policy Manager
Subscribe
Big-ip Advanced Firewall Manager
Subscribe
Big-ip Analytics
Subscribe
Big-ip Application Acceleration Manager
Subscribe
Big-ip Application Security Manager
Subscribe
Big-ip Domain Name System
Subscribe
Big-ip Edge Gateway
Subscribe
Big-ip Fraud Protection Service
Subscribe
Big-ip Global Traffic Manager
Subscribe
Big-ip Link Controller
Subscribe
Big-ip Local Traffic Manager
Subscribe
Big-ip Policy Enforcement Manager
Subscribe
Big-ip Webaccelerator
Subscribe
Big-iq Centralized Management
Subscribe
Traffix Signaling Delivery Controller
Subscribe
|
|
Fedoraproject
Subscribe
|
Fedora
Subscribe
|
|
Mcafee
Subscribe
|
|
|
Netapp
Subscribe
|
A220
Subscribe
A220 Firmware
Subscribe
A320
Subscribe
A320 Firmware
Subscribe
A800
Subscribe
A800 Firmware
Subscribe
Active Iq Unified Manager
Subscribe
Altavault
Subscribe
C190
Subscribe
C190 Firmware
Subscribe
Cloud Backup
Subscribe
Clustered Data Ontap Antivirus Connector
Subscribe
Cn1610
Subscribe
Cn1610 Firmware
Subscribe
Element Software
Subscribe
Fas2720
Subscribe
Fas2720 Firmware
Subscribe
Fas2750
Subscribe
Fas2750 Firmware
Subscribe
Hci Compute Node
Subscribe
Hci Management Node
Subscribe
Hyper Converged Infrastructure
Subscribe
Oncommand Insight
Subscribe
Oncommand Unified Manager
Subscribe
Oncommand Unified Manager Core Package
Subscribe
Oncommand Workflow Automation
Subscribe
Ontap Select Deploy
Subscribe
Ontap Select Deploy Administration Utility
Subscribe
Santricity Smi-s Provider
Subscribe
Service Processor
Subscribe
Smi-s Provider
Subscribe
Snapcenter
Subscribe
Snapdrive
Subscribe
Snapprotect
Subscribe
Solidfire
Subscribe
Steelstore Cloud Integrated Storage
Subscribe
Storage Automation Store
Subscribe
Storagegrid
Subscribe
|
|
Nodejs
Subscribe
|
Node.js
Subscribe
|
|
Openssl
Subscribe
|
Openssl
Subscribe
|
|
Opensuse
Subscribe
|
Leap
Subscribe
|
|
Oracle
Subscribe
|
Api Gateway
Subscribe
Business Intelligence
Subscribe
Communications Diameter Signaling Router
Subscribe
Communications Performance Intelligence Center
Subscribe
Communications Session Border Controller
Subscribe
Communications Session Router
Subscribe
Communications Unified Session Manager
Subscribe
Endeca Server
Subscribe
Enterprise Manager Base Platform
Subscribe
Enterprise Manager Ops Center
Subscribe
Jd Edwards Enterpriseone Tools
Subscribe
Jd Edwards World Security
Subscribe
Mysql
Subscribe
Mysql Enterprise Monitor
Subscribe
Mysql Workbench
Subscribe
Peoplesoft Enterprise Peopletools
Subscribe
Secure Global Desktop
Subscribe
Services Tools Bundle
Subscribe
|
|
Paloaltonetworks
Subscribe
|
Pan-os
Subscribe
|
|
Redhat
Subscribe
|
|
|
Tenable
Subscribe
|
Nessus
Subscribe
|
Advisories
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-1701-1 | openssl security update |
Debian DSA |
DSA-4400-1 | openssl1.0 security update |
EUVD |
EUVD-2019-10116 | If an application encounters a fatal protocol error and then calls SSL_shutdown() twice (once to send a close_notify, and once to receive one) then OpenSSL can respond differently to the calling application if a 0 byte record is received with invalid padding compared to if a 0 byte record is received with an invalid MAC. If the application then behaves differently based on that in a way that is detectable to the remote peer, then this amounts to a padding oracle that could be used to decrypt data. In order for this to be exploitable "non-stitched" ciphersuites must be in use. Stitched ciphersuites are optimised implementations of certain commonly used ciphersuites. Also the application must call SSL_shutdown() twice even if a protocol error has occurred (applications should not do this but some do anyway). Fixed in OpenSSL 1.0.2r (Affected 1.0.2-1.0.2q). |
Ubuntu USN |
USN-3899-1 | OpenSSL vulnerability |
Ubuntu USN |
USN-4376-2 | OpenSSL vulnerabilities |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Sun, 13 Jul 2025 13:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
epss
|
epss
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: openssl
Published:
Updated: 2024-09-17T04:20:35.057Z
Reserved: 2018-11-28T00:00:00
Link: CVE-2019-1559
No data.
Status : Modified
Published: 2019-02-27T23:29:00.277
Modified: 2024-11-21T04:36:48.960
Link: CVE-2019-1559
OpenCVE Enrichment
No data.
Debian DLA
Debian DSA
EUVD
Ubuntu USN