NVD Vulnerability Detail
Search Exploit, PoC
CVE-2019-1552
Summary

OpenSSL has internal defaults for a directory tree where it can find a configuration file as well as certificates used for verification in TLS. This directory is most commonly referred to as OPENSSLDIR, and is configurable with the --prefix / --openssldir configuration options. For OpenSSL versions 1.1.0 and 1.1.1, the mingw configuration targets assume that resulting programs and libraries are installed in a Unix-like environment and the default prefix for program installation as well as for OPENSSLDIR should be '/usr/local'. However, mingw programs are Windows programs, and as such, find themselves looking at sub-directories of 'C:/usr/local', which may be world writable, which enables untrusted users to modify OpenSSL's default configuration, insert CA certificates, modify (or even replace) existing engine modules, etc. For OpenSSL 1.0.2, '/usr/local/ssl' is used as default for OPENSSLDIR on all Unix and Windows targets, including Visual C builds. However, some build instructions for the diverse Windows targets on 1.0.2 encourage you to specify your own --prefix. OpenSSL versions 1.1.1, 1.1.0 and 1.0.2 are affected by this issue. Due to the limited scope of affected deployments this has been assessed as low severity and therefore we are not creating new releases at this time. Fixed in OpenSSL 1.1.1d (Affected 1.1.1-1.1.1c). Fixed in OpenSSL 1.1.0l (Affected 1.1.0-1.1.0k). Fixed in OpenSSL 1.0.2t (Affected 1.0.2-1.0.2s).

Publication Date July 31, 2019, 2:15 a.m.
Registration Date Jan. 26, 2021, 11:39 a.m.
Last Update Nov. 21, 2024, 1:36 p.m.
CVSS3.0 : LOW
スコア 3.3
Vector CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N
攻撃元区分(AV) ローカル
攻撃条件の複雑さ(AC)
攻撃に必要な特権レベル(PR)
利用者の関与(UI) 不要
影響の想定範囲(S) 変更なし
機密性への影響(C) なし
完全性への影響(I)
可用性への影響(A) なし
CVSS2.0 : LOW
Score 1.9
Vector AV:L/AC:M/Au:N/C:N/I:P/A:N
攻撃元区分(AV) ローカル
攻撃条件の複雑さ(AC)
攻撃前の認証要否(Au) 不要
機密性への影響(C) なし
完全性への影響(I)
可用性への影響(A) なし
Get all privileges. いいえ
Get user privileges いいえ
Get other privileges いいえ
User operation required いいえ
Affected software configurations
Configuration1 or higher or less more than less than
cpe:2.3:a:openssl:openssl:*:*:*:*:*:*:*:* 1.1.1 1.1.1c
cpe:2.3:a:openssl:openssl:*:*:*:*:*:*:*:* 1.0.2 1.0.2s
cpe:2.3:a:openssl:openssl:*:*:*:*:*:*:*:* 1.1.0 1.1.0k
Related information, measures and tools
Common Vulnerabilities List

JVN Vulnerability Information
OpenSSL における証明書検証に関する脆弱性
Title OpenSSL における証明書検証に関する脆弱性
Summary

OpenSSL には、証明書検証に関する脆弱性が存在します。

Possible impacts 情報を改ざんされる可能性があります。
Solution

ベンダより正式な対策が公開されています。ベンダ情報を参照して適切な対策を実施してください。

Publication Date July 30, 2019, midnight
Registration Date Aug. 14, 2019, 10:39 a.m.
Last Update Dec. 25, 2020, 12:24 p.m.
Affected System
OpenSSL Project
OpenSSL 1.0.2 から 1.0.2s
OpenSSL 1.1.0 から 1.1.0k
OpenSSL 1.1.1 から 1.1.1c
CVE (情報セキュリティ 共通脆弱性識別子)
CWE (共通脆弱性タイプ一覧)
ベンダー情報
その他
Change Log
No Changed Details Date of change
1 [2019年08月14日]
  掲載
Aug. 14, 2019, 10:39 a.m.