The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a vigilance database and tools to fix them.

Vulnerability of OpenSSL: information disclosure via ECDSA Signature Generation

Synthesis of the vulnerability 

An attacker can bypass access restrictions to data via ECDSA Signature Generation of OpenSSL, in order to obtain sensitive information.
Vulnerable software: Blue Coat CAS, Broadcom Content Analysis, Debian, IRAD, Nodejs Core, OpenSSL, openSUSE Leap, Oracle Communications, Oracle Fusion Middleware, Oracle Identity Management, Solaris, Tuxedo, WebLogic, RHEL, SLES, Ubuntu.
Severity of this announce: 1/4.
Creation date: 29/10/2018.
Références of this computer vulnerability: bulletinjan2019, cpuapr2019, cpujan2020, cpujul2019, CVE-2018-0735, DLA-1586-1, DSA-4348-1, ibm10794537, openSUSE-SU-2018:3890-1, RHSA-2019:3700-01, SUSE-SU-2018:3863-1, SYMSA1490, USN-3840-1, VIGILANCE-VUL-27631.

Description of the vulnerability 

An attacker can bypass access restrictions to data via ECDSA Signature Generation of OpenSSL, in order to obtain sensitive information.
Full bulletin, software filtering, emails, fixes, ... (Request your free trial)

This security vulnerability impacts software or systems such as Blue Coat CAS, Broadcom Content Analysis, Debian, IRAD, Nodejs Core, OpenSSL, openSUSE Leap, Oracle Communications, Oracle Fusion Middleware, Oracle Identity Management, Solaris, Tuxedo, WebLogic, RHEL, SLES, Ubuntu.

Our Vigil@nce team determined that the severity of this computer weakness bulletin is low.

The trust level is of type confirmed by the editor, with an origin of user shell.

An attacker with a expert ability can exploit this security note.

Solutions for this threat 

OpenSSL: version 1.1.1a.
The version 1.1.1a is fixed:
  https://www.openssl.org/source/
  ftp://ftp.openssl.org/source/

OpenSSL: version 1.1.0j.
The version 1.1.0j is fixed:
  https://www.openssl.org/source/
  ftp://ftp.openssl.org/source/

OpenSSL: patch for ECDSA Signature Generation.
A patch is indicated in information sources.

Cloud Foundry: fixed versions for OpenSSL.
Fixed versions are indicated in information sources.

Debian 8: new openssl packages.
New packages are available:
  Debian 8: openssl 1.0.1t-1+deb8u10

Debian 9: new openssl packages.
New packages are available:
  Debian 9: openssl 1.1.0j-1~deb9u1

IBM Rational Application Developer for WebSphere: solution for Node.js.
The solution is indicated in information sources.

Node Core: version 10.16.0.
The version 10.16.0 is fixed:
  https://nodejs.org/en/download/

openSUSE Leap 15.0: new openssl-1_1 packages.
New packages are available:
  openSUSE Leap 15.0: openssl-1_1 1.1.0i-lp150.3.15.1

Oracle Communications: CPU of January 2020.
A Critical Patch Update is available:
  https://support.oracle.com/rs?type=doc&id=2625594.1
  https://support.oracle.com/rs?type=doc&id=2626101.1
  https://support.oracle.com/rs?type=doc&id=2628576.1
  https://support.oracle.com/rs?type=doc&id=2626102.1
  https://support.oracle.com/rs?type=doc&id=2622427.1
  https://support.oracle.com/rs?type=doc&id=2595443.1
  https://support.oracle.com/rs?type=doc&id=2595442.1
  https://support.oracle.com/rs?type=doc&id=2617852.1
  https://support.oracle.com/rs?type=doc&id=2626103.1

Oracle Fusion Middleware: CPU of April 2019.
A Critical Patch Update is available:
  https://support.oracle.com/rs?type=doc&id=2498664.1

Oracle Fusion Middleware: CPU of July 2019.
A Critical Patch Update is available:
  https://support.oracle.com/rs?type=doc&id=2534806.1

Oracle Solaris: patch for third party software of January 2019 v1.
A patch is available:
  https://support.oracle.com/rs?type=doc&id=1448883.1

RHEL 8: new openssl packages.
New packages are available:
  RHEL 8: openssl 1.1.1c-2.el8

SUSE LE 15: new openssl-1_1 packages.
New packages are available:
  SUSE LE 15 RTM: openssl-1_1 1.1.0i-4.15.1

Symantec CA/MA: solution for OpenSSL.
The solution is indicated in information sources.

Ubuntu: new libssl packages.
New packages are available:
  Ubuntu 18.10: libssl1.0.0 1.0.2n-1ubuntu6.1, libssl1.1 1.1.1-1ubuntu2.1
  Ubuntu 18.04 LTS: libssl1.0.0 1.0.2n-1ubuntu5.2, libssl1.1 1.1.0g-2ubuntu4.3
  Ubuntu 16.04 LTS: libssl1.0.0 1.0.2g-1ubuntu4.14
  Ubuntu 14.04 LTS: libssl1.0.0 1.0.1f-1ubuntu2.27

Wind River Linux: solution (28/11/2018).
The solution is indicated in information sources.
Full bulletin, software filtering, emails, fixes, ... (Request your free trial)

Computer vulnerabilities tracking service 

Vigil@nce provides a networks vulnerabilities watch. The technology watch team tracks security threats targeting the computer system.