The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a vigilance database and tools to fix them.

Vulnerability of OpenSSL: information disclosure via ECC Scalar Multiplication

Synthesis of the vulnerability 

On an Intel processor (VIGILANCE-VUL-27667), an attacker can measure the execution time of the ECC Scalar Multiplication of OpenSSL, in order to obtain the used key.
Impacted software: Blue Coat CAS, Broadcom Content Analysis, Debian, VNX Operating Environment, VNX Series, BIG-IP Hardware, TMOS, AIX, IRAD, Rational ClearCase, QRadar SIEM, MariaDB ~ precise, MySQL Community, MySQL Enterprise, OpenBSD, OpenSSL, openSUSE Leap, Oracle Communications, Oracle Fusion Middleware, Oracle Identity Management, Solaris, Tuxedo, WebLogic, Percona Server, XtraBackup, RHEL, Slackware, SUSE Linux Enterprise Desktop, SLES, Synology DSM, Synology DS***, Synology RS***, Nessus, Ubuntu, WinSCP, X2GoClient.
Severity of this computer vulnerability: 1/4.
Creation date: 12/11/2018.
Références of this announce: bulletinjan2019, CERTFR-2018-AVI-607, CERTFR-2019-AVI-242, cpuapr2019, cpuapr2020, cpujan2019, cpujan2020, cpujul2019, CVE-2018-5407, DLA-1586-1, DSA-2019-197, DSA-2020-030, DSA-4348-1, DSA-4355-1, ibm10794537, ibm10875298, ibm10886313, K49711130, openSUSE-SU-2018:3903-1, openSUSE-SU-2018:4050-1, openSUSE-SU-2018:4104-1, openSUSE-SU-2019:0088-1, openSUSE-SU-2019:0234-1, RHSA-2019:0483-01, RHSA-2019:2125-01, SSA:2018-325-01, SUSE-SU-2018:3864-1, SUSE-SU-2018:3864-2, SUSE-SU-2018:3866-1, SUSE-SU-2018:3964-1, SUSE-SU-2018:3989-1, SUSE-SU-2018:4001-1, SUSE-SU-2018:4068-1, SUSE-SU-2018:4274-1, SUSE-SU-2019:0117-1, SUSE-SU-2019:0395-1, SUSE-SU-2019:1553-1, SYMSA1490, TNS-2018-16, TNS-2018-17, USN-3840-1, VIGILANCE-VUL-27760.

Description of the vulnerability 

On an Intel processor (VIGILANCE-VUL-27667), an attacker can measure the execution time of the ECC Scalar Multiplication of OpenSSL, in order to obtain the used key.
Full bulletin, software filtering, emails, fixes, ... (Request your free trial)

This cybersecurity weakness impacts software or systems such as Blue Coat CAS, Broadcom Content Analysis, Debian, VNX Operating Environment, VNX Series, BIG-IP Hardware, TMOS, AIX, IRAD, Rational ClearCase, QRadar SIEM, MariaDB ~ precise, MySQL Community, MySQL Enterprise, OpenBSD, OpenSSL, openSUSE Leap, Oracle Communications, Oracle Fusion Middleware, Oracle Identity Management, Solaris, Tuxedo, WebLogic, Percona Server, XtraBackup, RHEL, Slackware, SUSE Linux Enterprise Desktop, SLES, Synology DSM, Synology DS***, Synology RS***, Nessus, Ubuntu, WinSCP, X2GoClient.

Our Vigil@nce team determined that the severity of this security vulnerability is low.

The trust level is of type confirmed by the editor, with an origin of user shell.

An attacker with a expert ability can exploit this vulnerability bulletin.

Solutions for this threat 

OpenSSL: version 1.1.0i.
The version 1.1.0i is fixed:
  https://www.openssl.org/source/

OpenSSL: version 1.0.2q.
The version 1.0.2q is fixed:
  https://www.openssl.org/source/
  ftp://ftp.openssl.org/source/

A10 ACOS: fixed versions for Intel.
Fixed versions are indicated in information sources.

AIX: patch for OpenSSL.
A patch is available:
  https://aix.software.ibm.com/aix/efixes/security/openssl_fix29.tar

Cloud Foundry: fixed versions for OpenSSL.
Fixed versions are indicated in information sources.

Debian 8: new openssl packages.
New packages are available:
  Debian 8: openssl 1.0.1t-1+deb8u10

Debian 9: new openssl1.0 packages.
New packages are available:
  Debian 9: openssl1.0 1.0.2q-1~deb9u1

Debian 9: new openssl packages.
New packages are available:
  Debian 9: openssl 1.1.0j-1~deb9u1

Dell EMC VNXe3200: version 3.1.11.10003441.
The version 3.1.11.10003441 is fixed:
  https://www.dell.com/support/

Dell EMC VNXe: version MR4 Service Pack 5.
The version MR4 Service Pack 5 is fixed:
  https://www.dell.com/support/

F5 BIG-IP: solution for PortSmash.
The solution is indicated in information sources.

IBM QRadar SIEM: patch for OpenSSL.
A patch is indicated in information sources.

IBM Rational Application Developer for WebSphere: solution for Node.js.
The solution is indicated in information sources.

IBM Rational ClearCase: patch for OpenSSL.
A patch is indicated in information sources.

MariaDB: version 5.5.63.
The version 5.5.63 is fixed:
  https://mariadb.com/downloads/

MySQL: version 5.6.44.
The version 5.6.44 is fixed:
  https://support.oracle.com/rs?type=doc&id=2522850.1
  https://www.mysql.com/fr/

MySQL: version 5.7.26.
The version 5.7.26 is fixed:
  https://support.oracle.com/rs?type=doc&id=2522850.1
  https://www.mysql.com/fr/

MySQL: version 8.0.16.
The version 8.0.16 is fixed:
  https://support.oracle.com/rs?type=doc&id=2522850.1
  https://www.mysql.com/fr/

Nessus: version 7.1.4.
The version 7.1.4 is fixed:
  https://www.tenable.com/

Nessus: version 8.1.1.
The version 8.1.1 is fixed:
  https://www.tenable.com/

OpenBSD: patch for OpenSSL DSA/ECDSA.
A patch is available:
  https://ftp.openbsd.org/pub/OpenBSD/patches/6.3/common/022_blinding.patch.sig

openSUSE Leap 15.0: new openssl-1_0_0 packages.
New packages are available:
  openSUSE Leap 15.0: openssl-1_0_0 1.0.2p-lp150.2.9.1

openSUSE Leap 42.3: new compat-openssl098 packages.
New packages are available:
  openSUSE Leap 42.3: compat-openssl098 0.9.8j-27.1

openSUSE Leap 42.3: new nodejs4 packages.
New packages are available:
  openSUSE Leap 42.3: nodejs4 4.9.1-20.1

openSUSE Leap 42.3: new nodejs6 packages.
New packages are available:
  openSUSE Leap 42.3: nodejs6 6.16.0-18.1

openSUSE Leap 42.3: new openssl packages.
New packages are available:
  openSUSE Leap 42.3: openssl 1.0.2j-32.1

Oracle Communications: CPU of January 2020.
A Critical Patch Update is available:
  https://support.oracle.com/rs?type=doc&id=2625594.1
  https://support.oracle.com/rs?type=doc&id=2626101.1
  https://support.oracle.com/rs?type=doc&id=2628576.1
  https://support.oracle.com/rs?type=doc&id=2626102.1
  https://support.oracle.com/rs?type=doc&id=2622427.1
  https://support.oracle.com/rs?type=doc&id=2595443.1
  https://support.oracle.com/rs?type=doc&id=2595442.1
  https://support.oracle.com/rs?type=doc&id=2617852.1
  https://support.oracle.com/rs?type=doc&id=2626103.1

Oracle Communications: CPU of July 2019.
A Critical Patch Update is available:
  https://support.oracle.com/rs?type=doc&id=2559239.1
  https://support.oracle.com/rs?type=doc&id=2563691.1
  https://support.oracle.com/rs?type=doc&id=2559240.1
  https://support.oracle.com/rs?type=doc&id=2559722.1
  https://support.oracle.com/rs?type=doc&id=2559225.1
  https://support.oracle.com/rs?type=doc&id=2559721.1
  https://support.oracle.com/rs?type=doc&id=2559256.1
  https://support.oracle.com/rs?type=doc&id=2559242.1
  https://support.oracle.com/rs?type=doc&id=2559243.1
  https://support.oracle.com/rs?type=doc&id=2559648.1

Oracle Fusion Middleware: CPU of April 2019.
A Critical Patch Update is available:
  https://support.oracle.com/rs?type=doc&id=2498664.1

Oracle Fusion Middleware: CPU of July 2019.
A Critical Patch Update is available:
  https://support.oracle.com/rs?type=doc&id=2534806.1

Oracle MySQL: version 5.6.43.
The version 5.6.43 is fixed:
  https://support.oracle.com/rs?type=doc&id=2487644.1
  https://www.mysql.com/fr/

Oracle MySQL: version 5.7.25.
The version 5.7.25 is fixed:
  https://support.oracle.com/rs?type=doc&id=2487644.1
  https://www.mysql.com/fr/

Oracle MySQL: version 8.0.14.
The version 8.0.14 is fixed:
  https://support.oracle.com/rs?type=doc&id=2487644.1
  https://www.mysql.com/fr/

Oracle Solaris: CPU of April 2020.
A Critical Patch Update is available:
  https://support.oracle.com/rs?type=doc&id=2650589.1

Oracle Solaris: patch for third party software of January 2019 v1.
A patch is available:
  https://support.oracle.com/rs?type=doc&id=1448883.1

Percona Server for MySQL: version 5.7.25-28.
The version 5.7.25-28 is fixed:
  https://www.percona.com/

Percona Server: version 5.7.26-29.
The version 5.7.26-29 is fixed:
  https://www.percona.com/

Percona XtraDB Cluster: version 5.7.26-31.37.
The version 5.7.26-31.37 is fixed:
  https://www.percona.com/

RHEL 7.6: new openssl packages.
New packages are available:
  RHEL 7: openssl 1.0.2k-16.el7_6.1

RHEL 7: new ovmf packages.
New packages are available:
  RHEL 7: ovmf 20180508-6.gitee3198e672e2.el7

Slackware: new openssl packages.
New packages are available:
  Slackware 14.0: openssl 1.0.1u-*-1_slack14.0
  Slackware 14.1: openssl 1.0.1u-*-1_slack14.1
  Slackware 14.2: openssl 1.0.2q-*-1_slack14.2

SUSE LE 11: new openssl packages.
New packages are available:
  SUSE LE 11 SP3: openssl 0.9.8j-0.106.18.1
  SUSE LE 11 SP4: openssl 0.9.8j-0.106.18.1

SUSE LE 11 SP3: new openssl1 packages.
New packages are available:
  SUSE LE 11 SP3: openssl1 1.0.1g-0.58.15.1

SUSE LE 12: new nodejs4 packages.
New packages are available:
  SUSE LE 12 RTM-SP4: nodejs4 4.9.1-15.17.1

SUSE LE 12: new nodejs6 packages.
New packages are available:
  SUSE LE 12 RTM-SP4: nodejs6 6.16.0-11.21.1

SUSE LE 12 RTM: new openssl packages (19/06/2019).
New packages are available:
  SUSE LE 12 RTM: openssl 1.0.1i-27.34.1

SUSE LE 12 SP1: new openssl packages (23/11/2018).
New packages are available:
  SUSE LE 12 SP1: openssl 1.0.1i-54.20.1

SUSE LE 12 SP2/3: new openssl packages.
New packages are available:
  SUSE LE 12 SP2: openssl 1.0.2j-60.46.1
  SUSE LE 12 SP3: openssl 1.0.2j-60.46.1

SUSE LE 12 SP3/4: new compat-openssl098 packages.
New packages are available:
  SUSE LE 12 SP3: compat-openssl098 0.9.8j-106.9.1
  SUSE LE 12 SP4: compat-openssl098 0.9.8j-106.9.1

SUSE LE 12 SP4: new openssl-1_0_0 packages.
New packages are available:
  SUSE LE 12 SP4: openssl-1_0_0 1.0.2p-3.3.1

SUSE LE 15: new openssl-1_0_0 packages.
New packages are available:
  SUSE LE 15 RTM: openssl-1_0_0 1.0.2p-3.11.1

Synology DSM: version 6.2.2-24922.
The version 6.2.2-24922 is fixed.

Synology DS/RS: version 6.2.2-24922.
The version 6.2.2-24922 is fixed:
  https://www.synology.com/

Ubuntu: new libssl packages.
New packages are available:
  Ubuntu 18.10: libssl1.0.0 1.0.2n-1ubuntu6.1, libssl1.1 1.1.1-1ubuntu2.1
  Ubuntu 18.04 LTS: libssl1.0.0 1.0.2n-1ubuntu5.2, libssl1.1 1.1.0g-2ubuntu4.3
  Ubuntu 16.04 LTS: libssl1.0.0 1.0.2g-1ubuntu4.14
  Ubuntu 14.04 LTS: libssl1.0.0 1.0.1f-1ubuntu2.27

WinSCP: version 5.13.5.
The version 5.13.5 is fixed:
  https://winscp.net/
  https://sourceforge.net/projects/winscp/

X2Go Client for Windows: version 4.1.2.2-2020.02.13.
The version 4.1.2.2-2020.02.13 is fixed:
  http://wiki.x2go.org/doku.php/doc:release-notes-mswin:x2goclient-4.1.2.2
Full bulletin, software filtering, emails, fixes, ... (Request your free trial)

Computer vulnerabilities tracking service 

Vigil@nce provides a computers vulnerabilities workaround. The Vigil@nce vulnerability database contains several thousand vulnerabilities.