The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a vigilance database and tools to fix them.

Vulnerability of OpenSSL 1.0.2: information disclosure via 0-byte Record Padding Oracle

Synthesis of the vulnerability 

An attacker can bypass access restrictions to data via 0-byte Record Padding Oracle of OpenSSL 1.0.2, in order to obtain sensitive information.
Impacted software: SDS, SES, SNS, Blue Coat CAS, Broadcom Content Analysis, Debian, Avamar, NetWorker, Unisphere EMC, VNX Operating Environment, VNX Series, Fedora, AIX, IBM i, Rational ClearCase, QRadar SIEM, Tivoli Storage Manager, Juniper EX-Series, Juniper J-Series, Junos OS, Junos Space, SRX-Series, Juniper SBR, MariaDB ~ precise, McAfee Web Gateway, MySQL Community, MySQL Enterprise, Nodejs Core, OpenSSL, openSUSE Leap, Oracle Communications, Oracle Fusion Middleware, Oracle Identity Management, Solaris, Tuxedo, Oracle Virtual Directory, WebLogic, Palo Alto Firewall PA***, PAN-OS, Percona Server, Pulse Secure SBR, RHEL, SIMATIC, Slackware, SUSE Linux Enterprise Desktop, SLES, Synology DSM, Synology DS***, Synology RS***, Nessus, Ubuntu, WinSCP, X2GoClient.
Severity of this computer vulnerability: 2/4.
Creation date: 26/02/2019.
Références of this announce: 1170328, bulletinapr2019, bulletinjul2019, CERTFR-2019-AVI-080, CERTFR-2019-AVI-132, CERTFR-2019-AVI-214, CERTFR-2019-AVI-325, cpuapr2019, cpujan2020, cpujul2019, cpuoct2019, CVE-2019-1559, DLA-1701-1, DSA-2019-201, DSA-2020-062, DSA-2020-072, DSA-4400-1, FEDORA-2019-00c25b9379, ibm10876638, ibm10886237, ibm10886659, JSA10949, JSA10993, JSA11074, openSUSE-SU-2019:1076-1, openSUSE-SU-2019:1105-1, openSUSE-SU-2019:1173-1, openSUSE-SU-2019:1175-1, openSUSE-SU-2019:1432-1, openSUSE-SU-2019:1637-1, PAN-SA-2019-0039, RHBUG-1683804, RHBUG-1683807, RHSA-2019:2304-01, RHSA-2019:2471-01, SB10282, SSA:2019-057-01, SSB-439005, STORM-2019-001, SUSE-SU-2019:0572-1, SUSE-SU-2019:0600-1, SUSE-SU-2019:0658-1, SUSE-SU-2019:0803-1, SUSE-SU-2019:0818-1, SUSE-SU-2019:1362-1, SUSE-SU-2019:14091-1, SUSE-SU-2019:14092-1, SUSE-SU-2019:1553-1, SUSE-SU-2019:1608-1, SYMSA1490, TNS-2019-02, USN-3899-1, VIGILANCE-VUL-28600.

Description of the vulnerability 

An attacker can bypass access restrictions to data via 0-byte Record Padding Oracle of OpenSSL 1.0.2, in order to obtain sensitive information.
Full bulletin, software filtering, emails, fixes, ... (Request your free trial)

This vulnerability alert impacts software or systems such as SDS, SES, SNS, Blue Coat CAS, Broadcom Content Analysis, Debian, Avamar, NetWorker, Unisphere EMC, VNX Operating Environment, VNX Series, Fedora, AIX, IBM i, Rational ClearCase, QRadar SIEM, Tivoli Storage Manager, Juniper EX-Series, Juniper J-Series, Junos OS, Junos Space, SRX-Series, Juniper SBR, MariaDB ~ precise, McAfee Web Gateway, MySQL Community, MySQL Enterprise, Nodejs Core, OpenSSL, openSUSE Leap, Oracle Communications, Oracle Fusion Middleware, Oracle Identity Management, Solaris, Tuxedo, Oracle Virtual Directory, WebLogic, Palo Alto Firewall PA***, PAN-OS, Percona Server, Pulse Secure SBR, RHEL, SIMATIC, Slackware, SUSE Linux Enterprise Desktop, SLES, Synology DSM, Synology DS***, Synology RS***, Nessus, Ubuntu, WinSCP, X2GoClient.

Our Vigil@nce team determined that the severity of this computer weakness alert is medium.

The trust level is of type confirmed by the editor, with an origin of internet client.

An attacker with a expert ability can exploit this computer vulnerability.

Solutions for this threat 

OpenSSL: version 1.0.2r.
The version 1.0.2r is fixed:
  https://www.openssl.org/

AIX: patch for OpenSSL.
A patch is indicated in information sources.

Cloud Foundry: fixed versions for OpenSSL.
Fixed versions are indicated in information sources.

Debian 8: new openssl packages.
New packages are available:
  Debian 8: openssl 1.0.1t-1+deb8u11

Debian 9: new openssl1.0 packages.
New packages are available:
  Debian 9: openssl1.0 1.0.2r-1~deb9u1

Dell EMC Avamar, NetWorker: solution.
The solution is indicated in information sources.

Dell EMC Unisphere for PowerMax: solution.
The solution is indicated in information sources.

Dell EMC VNX2: fixed versions for Java.
Fixed versions are indicated in information sources.

Fedora 30: new compat-openssl10 packages.
New packages are available:
  Fedora 30: compat-openssl10 1.0.2o-7.fc30

IBM i: patch for OpenSSL.
A patch is indicated in information sources.

IBM QRadar SIEM: patch for OpenSSL.
A patch is indicated in information sources.

IBM Rational ClearCase: patch for OpenSSL.
A patch is indicated in information sources.

IBM Spectrum Protect Backup-Archive: patch for OpenSSL.
A patch is indicated in information sources.

Juniper Networks SBR Carrier: fixed versions for Third-party Software.
Fixed versions are indicated in information sources.

Juniper Networks SBR Carrier: versions 8.5.0-R17 and 8.6.0-R12.
Versions 8.5.0-R17 and 8.6.0-R12 are fixed:
  https://www.juniper.net/support/downloads/

Junos OS: fixed versions for OpenSSL.
Fixed versions are indicated in information sources.

Junos Space: version 19.4R1.
The version 19.4R1 is fixed:
  https://www.juniper.net/support/downloads/

MariaDB: solution for Record Padding Oracle.
After analysis, MariaDB is not impacted.

McAfee Web Gateway: versions 7.7.2.21, 7.8.2.8 and 8.1.1.
Versions 7.7.2.21, 7.8.2.8 and 8.1.1 are fixed.

MySQL: version 5.6.44.
The version 5.6.44 is fixed:
  https://support.oracle.com/rs?type=doc&id=2522850.1
  https://www.mysql.com/fr/

MySQL: version 5.6.45.
The version 5.6.45 is fixed:
  https://support.oracle.com/rs?type=doc&id=2559865.1
  https://dev.mysql.com/downloads/
  https://www.mysql.com/fr/

MySQL: version 5.7.26.
The version 5.7.26 is fixed:
  https://support.oracle.com/rs?type=doc&id=2522850.1
  https://www.mysql.com/fr/

MySQL: version 5.7.27.
The version 5.7.27 is fixed:
  https://support.oracle.com/rs?type=doc&id=2559865.1
  https://dev.mysql.com/downloads/
  https://www.mysql.com/fr/

MySQL: version 8.0.16.
The version 8.0.16 is fixed:
  https://support.oracle.com/rs?type=doc&id=2522850.1
  https://www.mysql.com/fr/

MySQL: version 8.0.17.
The version 8.0.17 is fixed:
  https://support.oracle.com/rs?type=doc&id=2559865.1
  https://dev.mysql.com/downloads/
  https://www.mysql.com/fr/

Nessus: version 8.3.0.
The version 8.3.0 is fixed:
  https://www.tenable.com/

Node Core: version 6.17.0.
The version 6.17.0 is fixed:
  https://nodejs.org/en/blog/release/v6.17.0

Node Core: version 8.15.1.
The version 8.15.1 is fixed:
  https://nodejs.org/en/blog/release/v8.15.1

openSUSE Leap 15.0: new openssl-1_0_0 packages.
New packages are available:
  openSUSE Leap 15.0: openssl-1_0_0 1.0.2p-lp150.2.13.1

openSUSE Leap 15.1: new openssl-1_0_0 packages.
New packages are available:
  openSUSE Leap 15.1: libopenssl1_0_0-1.0.2p-lp151.5.3.1, openssl-1_0_0 1.0.2p-lp151.5.3.1

openSUSE Leap 42.3: new compat-openssl098 packages.
New packages are available:
  openSUSE Leap 42.3: compat-openssl098 0.9.8j-30.1

openSUSE Leap 42.3: new nodejs4 packages.
New packages are available:
  openSUSE Leap 42.3: nodejs4 4.9.1-23.1

openSUSE Leap 42.3: new nodejs6 packages.
New packages are available:
  openSUSE Leap 42.3: nodejs6 6.17.0-21.1

openSUSE Leap 42.3: new openssl packages.
New packages are available:
  openSUSE Leap 42.3: openssl 1.0.2j-35.1

Oracle Communications: CPU of January 2020.
A Critical Patch Update is available:
  https://support.oracle.com/rs?type=doc&id=2625594.1
  https://support.oracle.com/rs?type=doc&id=2626101.1
  https://support.oracle.com/rs?type=doc&id=2628576.1
  https://support.oracle.com/rs?type=doc&id=2626102.1
  https://support.oracle.com/rs?type=doc&id=2622427.1
  https://support.oracle.com/rs?type=doc&id=2595443.1
  https://support.oracle.com/rs?type=doc&id=2595442.1
  https://support.oracle.com/rs?type=doc&id=2617852.1
  https://support.oracle.com/rs?type=doc&id=2626103.1

Oracle Fusion Middleware: CPU of January 2020.
A Critical Patch Update is available:
  https://support.oracle.com/rs?type=doc&id=2602410.1

Oracle Fusion Middleware: CPU of July 2019.
A Critical Patch Update is available:
  https://support.oracle.com/rs?type=doc&id=2534806.1

Oracle Fusion Middleware: CPU of October 2019.
A Critical Patch Update is available:
  https://support.oracle.com/rs?type=doc&id=2568292.1

Oracle Solaris: patch for third party software of April 2019 v1.
A patch is available:
  https://support.oracle.com/rs?type=doc&id=1448883.1

Oracle Solaris: patch for third party software of July 2019 v2.
A patch is available:
  https://support.oracle.com/rs?type=doc&id=1448883.1

Palo Alto PAN-OS: fixed versions for OpenSSL.
Fixed versions are indicated in information sources.

Percona Server: version 5.7.26-29.
The version 5.7.26-29 is fixed:
  https://www.percona.com/

Percona XtraDB Cluster: version 5.7.26-31.37.
The version 5.7.26-31.37 is fixed:
  https://www.percona.com/

RHEL 6.10: new openssl packages.
New packages are available:
  RHEL 6: openssl 1.0.1e-58.el6_10

RHEL 7: new openssl packages.
New packages are available:
  RHEL 7: openssl 1.0.2k-19.el7

RHEL: openssl packages.
New packages are available:
  VIGILANCE-SOL-67556
  VIGILANCE-SOL-67368

SIMATIC S7-1500 CPU 1518: workaround for GNU/Linux Vulnerabilities.
A workaround is indicated in the information source.

Slackware: new openssl packages.
New packages are available:
  Slackware 14.2: openssl 1.0.2r-*-1_slack14.2

Stormshield: workaround for OpenSSL.
A workaround is indicated in the information source.

SUSE LE 11: new openssl packages.
New packages are available:
  SUSE LE 11 SP4: openssl 0.9.8j-0.106.21.1

SUSE LE 12: new nodejs4 packages.
New packages are available:
  SUSE LE 12 RTM-SP4: nodejs4 4.9.1-15.20.1

SUSE LE 12: new nodejs6 packages.
New packages are available:
  SUSE LE 12 RTM-SP4: nodejs6 6.17.0-11.24.1

SUSE LE 12: new openssl-1_0_0 packages.
New packages are available:
  SUSE LE 12 SP4: openssl-1_0_0 1.0.2p-3.6.1
  SUSE LE 12 SP1: libopenssl1_0_0 1.0.1i-54.26.1, openssl 1.0.1i-54.26.1

SUSE LE 12 RTM: new openssl packages (19/06/2019).
New packages are available:
  SUSE LE 12 RTM: openssl 1.0.1i-27.34.1

SUSE LE 12 SP2/3: new openssl packages.
New packages are available:
  SUSE LE 12 SP2: openssl 1.0.2j-60.49.1
  SUSE LE 12 SP3: openssl 1.0.2j-60.49.1

SUSE LE 12 SP3/4: new compat-openssl098 packages.
New packages are available:
  SUSE LE 12 SP3: compat-openssl098 0.9.8j-106.12.1
  SUSE LE 12 SP4: compat-openssl098 0.9.8j-106.12.1

SUSE LE 15: new openssl-1_0_0 packages.
New packages are available:
  SUSE LE 15 RTM: openssl-1_0_0 1.0.2p-3.14.2

Symantec CA/MA: solution for OpenSSL.
The solution is indicated in information sources.

Synology DSM: version 6.2.2-24922.
The version 6.2.2-24922 is fixed.

Synology DS/RS: version 6.2.2-24922.
The version 6.2.2-24922 is fixed:
  https://www.synology.com/

Tenable Nessus Agent: version 7.4.0.
The version 7.4.0 is fixed:
  https://fr.tenable.com/

Ubuntu: new libssl1.0.0 packages.
New packages are available:
  Ubuntu 18.10: libssl1.0.0 1.0.2n-1ubuntu6.2
  Ubuntu 18.04 LTS: libssl1.0.0 1.0.2n-1ubuntu5.3
  Ubuntu 16.04 LTS: libssl1.0.0 1.0.2g-1ubuntu4.15

Wind River Linux: solution (21/05/2019).
The solution is indicated in information sources.

WinSCP: version 5.13.8.
The version 5.13.8 is fixed:
  https://sourceforge.net/projects/winscp/

X2Go Client for Windows: version 4.1.2.2-2020.02.13.
The version 4.1.2.2-2020.02.13 is fixed:
  http://wiki.x2go.org/doku.php/doc:release-notes-mswin:x2goclient-4.1.2.2
Full bulletin, software filtering, emails, fixes, ... (Request your free trial)

Computer vulnerabilities tracking service 

Vigil@nce provides system vulnerability patches. The Vigil@nce computer vulnerability tracking service alerts your teams of vulnerabilities or threats impacting your information system.