The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a vigilance database and tools to fix them.

Vulnerability of OpenSSL: information disclosure via ECDSA Falls Back

Synthesis of the vulnerability 

An attacker can bypass access restrictions to data via ECDSA Falls Back of OpenSSL, in order to obtain sensitive information.
Impacted products: Debian, Avamar, NetWorker, Unisphere EMC, AIX, IBM i, Tivoli Storage Manager, Tivoli Workload Scheduler, WebSphere MQ, MySQL Community, MySQL Enterprise, Data ONTAP 7-Mode, SnapCenter Backup Management, OpenSSL, openSUSE Leap, Oracle Communications, Oracle Fusion Middleware, Oracle OIT, Solaris, VirtualBox, WebLogic, Percona Server, RHEL, Slackware, SUSE Linux Enterprise Desktop, SLES, Ubuntu, WinSCP, X2GoClient.
Severity of this bulletin: 2/4.
Creation date: 11/09/2019.
Références of this threat: 1137844, 1172266, 1172278, 5695611, 5695629, 5695653, 5695851, 6199286, 6201879, CERTFR-2019-AVI-444, cpuapr2020, cpujan2020, cpuoct2019, CVE-2019-1547, DLA-1932-1, DSA-2019-201, DSA-2020-062, DSA-4539-1, DSA-4539-2, DSA-4539-3, DSA-4540-1, NTAP-20190919-0002, NTAP-20200122-0002, openSUSE-SU-2019:2158-1, openSUSE-SU-2019:2189-1, openSUSE-SU-2019:2268-1, openSUSE-SU-2019:2269-1, RHSA-2020:1840-01, SSA:2019-254-03, SUSE-SU-2019:14171-1, SUSE-SU-2019:14174-1, SUSE-SU-2019:2397-1, SUSE-SU-2019:2403-1, SUSE-SU-2019:2410-1, SUSE-SU-2019:2413-1, SUSE-SU-2019:2504-1, SUSE-SU-2019:2558-1, SUSE-SU-2019:2561-1, SUSE-SU-2020:0099-1, USN-4376-1, USN-4376-2, USN-4504-1, VIGILANCE-VUL-30291.

Description of the vulnerability 

An attacker can bypass access restrictions to data via ECDSA Falls Back of OpenSSL, in order to obtain sensitive information.
Full bulletin, software filtering, emails, fixes, ... (Request your free trial)

This vulnerability announce impacts software or systems such as Debian, Avamar, NetWorker, Unisphere EMC, AIX, IBM i, Tivoli Storage Manager, Tivoli Workload Scheduler, WebSphere MQ, MySQL Community, MySQL Enterprise, Data ONTAP 7-Mode, SnapCenter Backup Management, OpenSSL, openSUSE Leap, Oracle Communications, Oracle Fusion Middleware, Oracle OIT, Solaris, VirtualBox, WebLogic, Percona Server, RHEL, Slackware, SUSE Linux Enterprise Desktop, SLES, Ubuntu, WinSCP, X2GoClient.

Our Vigil@nce team determined that the severity of this cybersecurity threat is medium.

The trust level is of type confirmed by the editor, with an origin of internet client.

An attacker with a expert ability can exploit this computer threat bulletin.

Solutions for this threat 

OpenSSL: version 1.1.1d.
The version 1.1.1d is fixed:
  https://www.openssl.org/

OpenSSL: version 1.1.0l.
The version 1.1.0l is fixed:
  https://www.openssl.org/

OpenSSL: version 1.0.2t.
The version 1.0.2t is fixed:
  https://www.openssl.org/

AIX: patch for OpenSSL.
A patch is available:
  https://www-01.ibm.com/marketing/iwm/iwm/web/pickUrxNew.do?source=aixbp&S_PKG=openssl

Copssh: version 7.1.0.
The version 7.1.0 is fixed:
  https://www.itefix.net/

Debian 8: new openssl packages.
New packages are available:
  Debian 8: openssl 1.0.1t-1+deb8u12

Debian 9/10: new openssl packages.
New packages are available:
  Debian 9: openssl 1.1.0l-1~deb9u1
  Debian 10: openssl 1.1.1d-0+deb10u2

Debian 9: new openssl1.0 packages.
New packages are available:
  Debian 9: openssl1.0 1.0.2t-1~deb9u1

Dell EMC Avamar, NetWorker: solution.
The solution is indicated in information sources.

Dell EMC Unisphere for PowerMax: solution.
The solution is indicated in information sources.

IBM i: patch for OpenSSL.
A patch is indicated in information sources.

IBM Spectrum Protect: fixed versions.
Fixed versions are indicated in information sources.

IBM Tivoli Workload Scheduler: patch for OpenSSL.
A patch is available:
  For Tivoli Workload Scheduler Distributed 9.2.0 FP03: 9.2.0-TIV-TWS-FP0003-IJ23384
  For Tivoli Workload Scheduler Distributed 9.4.0 FP06: 9.4.0-TIV-TWS-FP0006-IJ23384

IBM WebSphere MQ for HP NonStop Server: version 5.3.1.16.
The version 5.3.1.16 is fixed:
  https://www-945.ibm.com/support/fixcentral/swg/selectFixes?parent=ibm%7EWebSphere&product=ibm/WebSphere/WebSphere+MQ&release=5.3.1.16&platform=HP+NonStop&function=all&useReleaseAsTarget=true

openSUSE Leap 15: new openssl-1_0_0 packages.
New packages are available:
  openSUSE Leap 15.0: openssl-1_0_0 1.0.2p-lp150.2.19.1
  openSUSE Leap 15.1: openssl-1_0_0 1.0.2p-lp151.5.10.1

openSUSE Leap 15: new openssl-1_1 packages.
New packages are available:
  openSUSE Leap 15.1: openssl-1_1 1.1.0i-lp151.8.3.1
  openSUSE Leap 15.0: openssl-1_1 1.1.0i-lp150.3.25.1

Oracle Communications: CPU of January 2020.
A Critical Patch Update is available:
  https://support.oracle.com/rs?type=doc&id=2625594.1
  https://support.oracle.com/rs?type=doc&id=2626101.1
  https://support.oracle.com/rs?type=doc&id=2628576.1
  https://support.oracle.com/rs?type=doc&id=2626102.1
  https://support.oracle.com/rs?type=doc&id=2622427.1
  https://support.oracle.com/rs?type=doc&id=2595443.1
  https://support.oracle.com/rs?type=doc&id=2595442.1
  https://support.oracle.com/rs?type=doc&id=2617852.1
  https://support.oracle.com/rs?type=doc&id=2626103.1

Oracle Fusion Middleware: CPU of April 2020.
A Critical Patch Update is available:
  https://support.oracle.com/rs?type=doc&id=2633852.1

Oracle MySQL: version 5.6.48.
The version 5.6.48 is fixed:
  https://support.oracle.com/rs?type=doc&id=2648128.1
  https://www.mysql.com/fr/downloads/
  https://dev.mysql.com/downloads/mysql/

Oracle MySQL: version 5.7.30.
The version 5.7.30 is fixed:
  https://support.oracle.com/rs?type=doc&id=2648128.1
  https://www.mysql.com/fr/downloads/
  https://dev.mysql.com/downloads/mysql/

Oracle MySQL: version 8.0.20.
The version 8.0.20 is fixed:
  https://support.oracle.com/rs?type=doc&id=2648128.1
  https://www.mysql.com/fr/downloads/
  https://dev.mysql.com/downloads/mysql/

Oracle Solaris: patch for third party software of October 2019 v3.
A patch is available:
  https://support.oracle.com/rs?type=doc&id=1448883.1

Oracle VM VirtualBox: version 5.2.34.
The version 5.2.34 is fixed:
  https://support.oracle.com/rs?type=doc&id=2592169.1
  https://www.virtualbox.org/wiki/Downloads

Oracle VM VirtualBox: version 6.0.14.
The version 6.0.14 is fixed:
  https://support.oracle.com/rs?type=doc&id=2592169.1
  https://www.virtualbox.org/wiki/Downloads

Percona Server: version 5.6.48-88.0.
The version 5.6.48-88.0 is fixed.

RHEL 8: new openssl packages.
New packages are available:
  RHEL 8.0-8.1: openssl 1.1.1c-15.el8

Slackware: new openssl packages.
New packages are available:
  Slackware 14.2: openssl 1.0.2t-*-1_slack14.2

SUSE LE 11: new openssl1 packages.
New packages are available:
  SUSE LE 11 RTM-SP4: openssl1 1.0.1g-0.58.21.1

SUSE LE 11 SP3, SP4: new openssl packages.
New packages are available:
  SUSE LE 11 SP4: openssl 0.9.8j-0.106.25.1
  SUSE LE 11 SP3: openssl 0.9.8j-0.106.25.1

SUSE LE 12: new compat-openssl098 packages (07/10/2019).
New packages are available:
  SUSE LE 12 SP4: compat-openssl098 0.9.8j-106.15.1
  SUSE LE 12 SP3: compat-openssl098 0.9.8j-106.15.1
  SUSE LE 12 SP2: compat-openssl098 0.9.8j-106.15.1
  SUSE LE 12 SP1: compat-openssl098 0.9.8j-106.15.1

SUSE LE 12 SP1: new openssl packages.
New packages are available:
  SUSE LE 12 SP1: openssl 1.0.1i-54.29.1

SUSE LE 12 SP2, SP3: new openssl packages.
New packages are available:
  SUSE LE 12 SP2: openssl 1.0.2j-60.55.1
  SUSE LE 12 SP3: openssl 1.0.2j-60.55.1

SUSE LE 12 SP4/5: new openssl-1_1 packages.
New packages are available:
  SUSE LE 12 SP4: openssl-1_1 1.1.1d-2.20.1
  SUSE LE 12 SP5: openssl-1_1 1.1.1d-2.20.1

SUSE LE 12 SP4: new openssl-1_0_0 packages.
New packages are available:
  SUSE LE 12 SP4: openssl-1_0_0 1.0.2p-3.11.1

SUSE LE 15: new openssl-1_0_0 packages.
New packages are available:
  SUSE LE 15 RTM: openssl-1_0_0 1.0.2p-3.22.1
  SUSE LE 15 SP1: openssl-1_0_0 1.0.2p-3.22.1

SUSE LE 15 RTM: new openssl-1_1 packages.
New packages are available:
  SUSE LE 15 RTM: openssl-1_1 1.1.0i-4.24.1

SUSE LE 15 SP1: new openssl-1_1 packages.
New packages are available:
  SUSE LE 15 SP1: openssl-1_1 1.1.0i-14.3.1

Ubuntu: new libssl1.0.0 packages.
New packages are available:
  Ubuntu 18.04 LTS: libssl1.0.0 1.0.2n-1ubuntu5.4
  Ubuntu 16.04 LTS: libssl1.0.0 1.0.2g-1ubuntu4.17

Ubuntu: new OpenSSL packages.
New packages are available:
  Ubuntu 19.10: libssl1.1 1.1.1c-1ubuntu4.1
  Ubuntu 18.04 LTS: libssl1.1 1.1.1-1ubuntu2.1~18.04.6
  Ubuntu 16.04 LTS: libssl1.0.0 1.0.2g-1ubuntu4.16
  Ubuntu 14.04 ESM: libssl1.0.0 1.0.1f-1ubuntu2.27+esm1
  Ubuntu 12.04 ESM: libssl1.0.0 1.0.1-4ubuntu5.44

Wind River Linux: version 10.18.44.11.
The version 10.18.44.11 is fixed:
  https://support2.windriver.com/

WinSCP: version 5.15.4.
The version 5.15.4 is fixed:
  https://sourceforge.net/projects/winscp/files/WinSCP/5.15.4/

X2Go Client for Windows: version 4.1.2.2-2020.02.13.
The version 4.1.2.2-2020.02.13 is fixed:
  http://wiki.x2go.org/doku.php/doc:release-notes-mswin:x2goclient-4.1.2.2
Full bulletin, software filtering, emails, fixes, ... (Request your free trial)

Computer vulnerabilities tracking service 

Vigil@nce provides a computer vulnerability note. The Vigil@nce team tracks computer vulnerabilities impacting systems and applications.