If an application encounters a fatal protocol error and then calls SSL_shutdown() twice (once to send a close_notify, and once to receive one) then OpenSSL can respond differently to the calling application if a 0 byte record is received with invalid padding compared to if a 0 byte record is received with an invalid MAC. If the application then behaves differently based on that in a way that is detectable to the remote peer, then this amounts to a padding oracle that could be used to decrypt data. In order for this to be exploitable "non-stitched" ciphersuites must be in use. Stitched ciphersuites are optimised implementations of certain commonly used ciphersuites. Also the application must call SSL_shutdown() twice even if a protocol error has occurred (applications should not do this but some do anyway). Fixed in OpenSSL 1.0.2r (Affected 1.0.2-1.0.2q).

Project Subscriptions

Vendors Products
Canonical Subscribe
Ubuntu Linux Subscribe
Debian Linux Subscribe
Big-ip Access Policy Manager Subscribe
Big-ip Advanced Firewall Manager Subscribe
Big-ip Analytics Subscribe
Big-ip Application Acceleration Manager Subscribe
Big-ip Application Security Manager Subscribe
Big-ip Domain Name System Subscribe
Big-ip Edge Gateway Subscribe
Big-ip Fraud Protection Service Subscribe
Big-ip Global Traffic Manager Subscribe
Big-ip Link Controller Subscribe
Big-ip Local Traffic Manager Subscribe
Big-ip Policy Enforcement Manager Subscribe
Big-ip Webaccelerator Subscribe
Big-iq Centralized Management Subscribe
Traffix Signaling Delivery Controller Subscribe
Fedoraproject Subscribe
Data Exchange Layer Subscribe
Threat Intelligence Exchange Server Subscribe
Web Gateway Subscribe
A220 Firmware Subscribe
A320 Firmware Subscribe
A800 Firmware Subscribe
Active Iq Unified Manager Subscribe
Altavault Subscribe
C190 Firmware Subscribe
Cloud Backup Subscribe
Clustered Data Ontap Antivirus Connector Subscribe
Cn1610 Firmware Subscribe
Element Software Subscribe
Fas2720 Subscribe
Fas2720 Firmware Subscribe
Fas2750 Subscribe
Fas2750 Firmware Subscribe
Hci Compute Node Subscribe
Hci Management Node Subscribe
Hyper Converged Infrastructure Subscribe
Oncommand Insight Subscribe
Oncommand Unified Manager Subscribe
Oncommand Unified Manager Core Package Subscribe
Oncommand Workflow Automation Subscribe
Ontap Select Deploy Subscribe
Ontap Select Deploy Administration Utility Subscribe
Santricity Smi-s Provider Subscribe
Service Processor Subscribe
Smi-s Provider Subscribe
Snapcenter Subscribe
Snapdrive Subscribe
Snapprotect Subscribe
Solidfire Subscribe
Steelstore Cloud Integrated Storage Subscribe
Storage Automation Store Subscribe
Storagegrid Subscribe
Node.js Subscribe
Openssl Subscribe
Openssl Subscribe
Opensuse Subscribe
Api Gateway Subscribe
Business Intelligence Subscribe
Communications Diameter Signaling Router Subscribe
Communications Performance Intelligence Center Subscribe
Communications Session Border Controller Subscribe
Communications Session Router Subscribe
Communications Unified Session Manager Subscribe
Endeca Server Subscribe
Enterprise Manager Base Platform Subscribe
Enterprise Manager Ops Center Subscribe
Jd Edwards Enterpriseone Tools Subscribe
Jd Edwards World Security Subscribe
Mysql Enterprise Monitor Subscribe
Mysql Workbench Subscribe
Peoplesoft Enterprise Peopletools Subscribe
Secure Global Desktop Subscribe
Services Tools Bundle Subscribe
Paloaltonetworks Subscribe
Ansible Tower Subscribe
Enterprise Linux Subscribe
Enterprise Linux Desktop Subscribe
Enterprise Linux Server Subscribe
Enterprise Linux Workstation Subscribe
Jboss Enterprise Web Server Subscribe
Virtualization Subscribe
Virtualization Host Subscribe
Tenable Subscribe
Advisories
Source ID Title
Debian DLA Debian DLA DLA-1701-1 openssl security update
Debian DSA Debian DSA DSA-4400-1 openssl1.0 security update
EUVD EUVD EUVD-2019-10116 If an application encounters a fatal protocol error and then calls SSL_shutdown() twice (once to send a close_notify, and once to receive one) then OpenSSL can respond differently to the calling application if a 0 byte record is received with invalid padding compared to if a 0 byte record is received with an invalid MAC. If the application then behaves differently based on that in a way that is detectable to the remote peer, then this amounts to a padding oracle that could be used to decrypt data. In order for this to be exploitable "non-stitched" ciphersuites must be in use. Stitched ciphersuites are optimised implementations of certain commonly used ciphersuites. Also the application must call SSL_shutdown() twice even if a protocol error has occurred (applications should not do this but some do anyway). Fixed in OpenSSL 1.0.2r (Affected 1.0.2-1.0.2q).
Ubuntu USN Ubuntu USN USN-3899-1 OpenSSL vulnerability
Ubuntu USN Ubuntu USN USN-4376-2 OpenSSL vulnerabilities
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

References
Link Providers
http://lists.opensuse.org/opensuse-security-announce/2019-03/msg00041.html cve-icon cve-icon
http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00019.html cve-icon cve-icon
http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00046.html cve-icon cve-icon
http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00047.html cve-icon cve-icon
http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00049.html cve-icon cve-icon
http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00080.html cve-icon cve-icon
http://www.securityfocus.com/bid/107174 cve-icon cve-icon
https://access.redhat.com/errata/RHSA-2019:2304 cve-icon cve-icon
https://access.redhat.com/errata/RHSA-2019:2437 cve-icon cve-icon
https://access.redhat.com/errata/RHSA-2019:2439 cve-icon cve-icon
https://access.redhat.com/errata/RHSA-2019:2471 cve-icon cve-icon
https://access.redhat.com/errata/RHSA-2019:3929 cve-icon cve-icon
https://access.redhat.com/errata/RHSA-2019:3931 cve-icon cve-icon
https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=e9bbefbf0f24c57645e7ad6a5a71ae649d18ac8e cve-icon cve-icon
https://github.com/RUB-NDS/TLS-Padding-Oracles cve-icon
https://kc.mcafee.com/corporate/index?page=content&id=SB10282 cve-icon cve-icon
https://lists.debian.org/debian-lts-announce/2019/03/msg00003.html cve-icon cve-icon
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/EWC42UXL5GHTU5G77VKBF6JYUUNGSHOM/ cve-icon cve-icon
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/Y3IVFGSERAZLNJCK35TEM2R4726XIH3Z/ cve-icon cve-icon
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZBEV5QGDRFUZDMNECFXUSN5FMYOZDE4V/ cve-icon cve-icon
https://nvd.nist.gov/vuln/detail/CVE-2019-1559 cve-icon
https://security.gentoo.org/glsa/201903-10 cve-icon cve-icon
https://security.netapp.com/advisory/ntap-20190301-0001/ cve-icon cve-icon
https://security.netapp.com/advisory/ntap-20190301-0002/ cve-icon cve-icon
https://security.netapp.com/advisory/ntap-20190423-0002/ cve-icon cve-icon
https://support.f5.com/csp/article/K18549143 cve-icon cve-icon
https://support.f5.com/csp/article/K18549143?utm_source=f5support&amp%3Butm_medium=RSS cve-icon cve-icon
https://usn.ubuntu.com/3899-1/ cve-icon cve-icon
https://usn.ubuntu.com/4376-2/ cve-icon cve-icon
https://www.cve.org/CVERecord?id=CVE-2019-1559 cve-icon
https://www.debian.org/security/2019/dsa-4400 cve-icon cve-icon
https://www.openssl.org/news/secadv/20190226.txt cve-icon cve-icon cve-icon
https://www.oracle.com/security-alerts/cpujan2020.html cve-icon cve-icon
https://www.oracle.com/security-alerts/cpujan2021.html cve-icon cve-icon
https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html cve-icon cve-icon
https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html cve-icon cve-icon
https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html cve-icon cve-icon
https://www.tenable.com/security/tns-2019-02 cve-icon cve-icon
https://www.tenable.com/security/tns-2019-03 cve-icon cve-icon
History

Sun, 13 Jul 2025 13:45:00 +0000

Type Values Removed Values Added
Metrics epss

{'score': 0.05051}

epss

{'score': 0.04426}


Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: openssl

Published:

Updated: 2024-09-17T04:20:35.057Z

Reserved: 2018-11-28T00:00:00

Link: CVE-2019-1559

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2019-02-27T23:29:00.277

Modified: 2024-11-21T04:36:48.960

Link: CVE-2019-1559

cve-icon Redhat

Severity : Moderate

Publid Date: 2019-02-26T00:00:00Z

Links: CVE-2019-1559 - Bugzilla

cve-icon OpenCVE Enrichment

No data.

Weaknesses