TROYANOSYVIRUS
Retour aux CVEs

CVE-2019-1549

MEDIUM
5.3

Description

OpenSSL 1.1.1 introduced a rewritten random number generator (RNG). This was intended to include protection in the event of a fork() system call in order to ensure that the parent and child processes did not share the same RNG state. However this protection was not being used in the default case. A partial mitigation for this issue is that the output from a high precision timer is mixed into the RNG state so the likelihood of a parent and child process sharing state is significantly reduced. If an application already calls OPENSSL_init_crypto() explicitly using OPENSSL_INIT_ATFORK then this problem does not occur at all. Fixed in OpenSSL 1.1.1d (Affected 1.1.1-1.1.1c).

Details CVE

Score CVSS v3.15.3
SeveriteMEDIUM
Vecteur CVSSCVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
Vecteur d'attaqueNETWORK
ComplexiteLOW
Privileges requisNONE
Interaction utilisateurNONE
Publie9/10/2019
Derniere modification11/21/2024
Sourcenvd
Observations honeypot0

Produits affectes

openssl:openssl

Faiblesses (CWE)

CWE-330

References

https://seclists.org/bugtraq/2019/Oct/1(openssl-security@openssl.org)
https://support.f5.com/csp/article/K44070243(openssl-security@openssl.org)
https://usn.ubuntu.com/4376-1/(openssl-security@openssl.org)
https://www.debian.org/security/2019/dsa-4539(openssl-security@openssl.org)
https://seclists.org/bugtraq/2019/Oct/1(af854a3a-2127-422b-91ae-364da2661108)
https://security.netapp.com/advisory/ntap-20190919-0002/(af854a3a-2127-422b-91ae-364da2661108)
https://support.f5.com/csp/article/K44070243(af854a3a-2127-422b-91ae-364da2661108)
https://usn.ubuntu.com/4376-1/(af854a3a-2127-422b-91ae-364da2661108)
https://www.debian.org/security/2019/dsa-4539(af854a3a-2127-422b-91ae-364da2661108)
https://www.openssl.org/news/secadv/20190910.txt(af854a3a-2127-422b-91ae-364da2661108)
https://www.oracle.com/security-alerts/cpuapr2020.html(af854a3a-2127-422b-91ae-364da2661108)
https://www.oracle.com/security-alerts/cpujan2020.html(af854a3a-2127-422b-91ae-364da2661108)
https://www.oracle.com/security-alerts/cpujul2020.html(af854a3a-2127-422b-91ae-364da2661108)
https://www.oracle.com/security-alerts/cpuoct2020.html(af854a3a-2127-422b-91ae-364da2661108)

Correlations IOC

Aucune correlation enregistree

This product uses data from the NVD API but is not endorsed or certified by the NVD.