CVE-2019-1549

medium
New! CVE Severity Now Using CVSS v3

The calculated severity for CVEs has been updated to use CVSS v3 by default. CVEs that do not have a CVSS v3 score will fall back CVSS v2 for calculating severity. Severity display preferences can be toggled in the settings dropdown.

Description

OpenSSL 1.1.1 introduced a rewritten random number generator (RNG). This was intended to include protection in the event of a fork() system call in order to ensure that the parent and child processes did not share the same RNG state. However this protection was not being used in the default case. A partial mitigation for this issue is that the output from a high precision timer is mixed into the RNG state so the likelihood of a parent and child process sharing state is significantly reduced. If an application already calls OPENSSL_init_crypto() explicitly using OPENSSL_INIT_ATFORK then this problem does not occur at all. Fixed in OpenSSL 1.1.1d (Affected 1.1.1-1.1.1c).

References

https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=1b0fe00e2704b5e20334a16d3c9099d1ba2ef1be

https://lists.fedoraproject.org/archives/list/[email protected]/message/GY6SNRJP2S7Y42GIIDO3HXPNMDYN2U3A/

https://lists.fedoraproject.org/archives/list/[email protected]/message/ZN4VVQJ3JDCHGIHV4Y2YTXBYQZ6PWQ7E/

https://seclists.org/bugtraq/2019/Oct/1

https://security.netapp.com/advisory/ntap-20190919-0002/

https://support.f5.com/csp/article/K44070243

https://support.f5.com/csp/article/K44070243?utm_source=f5support&utm_medium=RSS

https://usn.ubuntu.com/4376-1/

https://www.debian.org/security/2019/dsa-4539

https://www.openssl.org/news/secadv/20190910.txt

https://www.oracle.com/security-alerts/cpuapr2020.html

https://www.oracle.com/security-alerts/cpujan2020.html

https://www.oracle.com/security-alerts/cpujul2020.html

https://www.oracle.com/security-alerts/cpuoct2020.html

https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html

Details

Source: MITRE

Published: 2019-09-10

Updated: 2020-10-20

Type: CWE-330

Risk Information

CVSS v2

Base Score: 5

Vector: AV:N/AC:L/Au:N/C:P/I:N/A:N

Impact Score: 2.9

Exploitability Score: 10

Severity: MEDIUM

CVSS v3

Base Score: 5.3

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N

Impact Score: 1.4

Exploitability Score: 3.9

Severity: MEDIUM

Vulnerable Software

Configuration 1

OR

cpe:2.3:a:openssl:openssl:*:*:*:*:*:*:*:* versions from 1.1.1 to 1.1.1c (inclusive)

Tenable Plugins

View all (15 total)

IDNameProductFamilySeverity
145975CentOS 8 : openssl (CESA-2020:1840)NessusCentOS Local Security Checks
medium
143010RHEL 8 : openssl (RHSA-2020:1840)NessusRed Hat Local Security Checks
medium
138622Amazon Linux 2 : openssl11 (ALAS-2020-1456)NessusAmazon Linux Local Security Checks
medium
136967Ubuntu 16.04 LTS / 18.04 LTS / 19.10 : OpenSSL vulnerabilities (USN-4376-1)NessusUbuntu Local Security Checks
medium
135235RHEL 6 / 7 : Red Hat JBoss Core Services Apache HTTP Server 2.4.37 SP2 (RHSA-2020:1337)NessusRed Hat Local Security Checks
critical
132926SUSE SLED12 / SLES12 Security Update : openssl-1_1 (SUSE-SU-2020:0099-1)NessusSuSE Local Security Checks
medium
132817EulerOS Virtualization for ARM 64 3.0.5.0 : openssl (EulerOS-SA-2020-1063)NessusHuawei Local Security Checks
medium
130806EulerOS 2.0 SP8 : openssl (EulerOS-SA-2019-2097)NessusHuawei Local Security Checks
medium
130110Photon OS 3.0: Nxtgn PHSA-2019-3.0-0033NessusPhotonOS Local Security Checks
medium
129635Fedora 31 : 1:openssl (2019-9ab7ee6309)NessusFedora Local Security Checks
medium
129513Fedora 29 : 1:openssl (2019-d51641f152)NessusFedora Local Security Checks
medium
129506Debian DSA-4539-1 : openssl - security updateNessusDebian Local Security Checks
medium
129327Fedora 30 : 1:openssl (2019-d15aac6c4e)NessusFedora Local Security Checks
medium
128746FreeBSD : OpenSSL -- Multiple vulnerabilities (9e0c6f7a-d46d-11e9-a1c7-b499baebfeaf)NessusFreeBSD Local Security Checks
medium
128116OpenSSL 1.1.1 < 1.1.1d Multiple VulnerabilitiesNessusWeb Servers
medium