CVE编号
CVE-2019-1552利用情况
暂无补丁情况
官方补丁披露时间
2019-07-31漏洞描述
OpenSSL是OpenSSL团队的一个开源的能够实现安全套接层(SSLv2/v3)和安全传输层(TLSv1)协议的通用加密库。该产品支持多种加密算法,包括对称密码、哈希算法、安全散列算法等。 OpenSSL 1.1.1版本至1.1.1c版本、1.1.0版本至1.1.0k版本和1.0.2版本至1.0.2s版本中存在安全漏洞。攻击者可利用该漏洞绕过安全保护。解决建议
厂商已发布了漏洞修复程序,请及时关注更新:https://www.openssl.org/news/secadv/20190730.txt
参考链接 |
|
---|---|
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=54aa9d51b09d67e9... | |
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=b15a19c148384e73... | |
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=d333ebaf9c773327... | |
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=e32bc855a81a2d48... | |
https://kc.mcafee.com/corporate/index?page=content&id=SB10365 | |
https://lists.fedoraproject.org/archives/list/[email protected]... | |
https://lists.fedoraproject.org/archives/list/[email protected]... | |
https://lists.fedoraproject.org/archives/list/[email protected]... | |
https://security.netapp.com/advisory/ntap-20190823-0006/ | |
https://support.f5.com/csp/article/K94041354 | |
https://support.f5.com/csp/article/K94041354?utm_source=f5support&utm_medium=RSS | |
https://www.kb.cert.org/vuls/id/429301 | |
https://www.openssl.org/news/secadv/20190730.txt | |
https://www.oracle.com/security-alerts/cpuapr2020.html | |
https://www.oracle.com/security-alerts/cpujan2020.html | |
https://www.oracle.com/security-alerts/cpujul2020.html | |
https://www.oracle.com/security-alerts/cpuoct2020.html | |
https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html | |
https://www.tenable.com/security/tns-2019-08 | |
https://www.tenable.com/security/tns-2019-09 |
受影响软件情况
# | 类型 | 厂商 | 产品 | 版本 | 影响面 | ||||
1 | |||||||||
---|---|---|---|---|---|---|---|---|---|
运行在以下环境 | |||||||||
应用 | openssl | openssl | * |
From (including) 1.0.2 |
Up to (including) 1.0.2s |
||||
运行在以下环境 | |||||||||
应用 | openssl | openssl | * |
From (including) 1.1.0 |
Up to (including) 1.1.0k |
||||
运行在以下环境 | |||||||||
应用 | openssl | openssl | * |
From (including) 1.1.1 |
Up to (including) 1.1.1c |
||||
运行在以下环境 | |||||||||
系统 | debian_10 | csync2 | * |
Up to (excluding) 2.0-22-gce67c55-1+deb10u1 |
|||||
运行在以下环境 | |||||||||
系统 | debian_9 | csync2 | * |
Up to (excluding) 2.0-8-g175a01c-4+deb9u1 |
|||||
运行在以下环境 | |||||||||
系统 | fedora_29 | csync2 | * |
Up to (excluding) 1.0.2o-7.fc29 |
|||||
运行在以下环境 | |||||||||
系统 | fedora_30 | csync2 | * |
Up to (excluding) 1.0.2o-7.fc30 |
|||||
运行在以下环境 | |||||||||
系统 | fedora_31 | csync2 | * |
Up to (excluding) 1.0.2o-8.fc31 |
|||||
运行在以下环境 | |||||||||
系统 | opensuse_Leap_15.2 | csync2 | * |
Up to (excluding) 2.0+git.1461714863.10636a4-lp152.5.3.1 |
|||||
- 攻击路径 本地
- 攻击复杂度 复杂
- 权限要求 普通权限
- 影响范围 有限影响
- EXP成熟度 未验证
- 补丁情况 官方补丁
- 数据保密性 无影响
- 数据完整性 传输被破坏
- 服务器危害 无影响
- 全网数量 N/A
还没有评论,来说两句吧...