If an application encounters a fatal protocol error and then calls SSLshutdown() twice (once to send a closenotify, and once to receive one) then OpenSSL can respond differently to the calling application if a 0 byte record is received with invalid padding compared to if a 0 byte record is received with an invalid MAC. If the application then behaves differently based on that in a way that is detectable to the remote peer, then this amounts to a padding oracle that could be used to decrypt data. In order for this to be exploitable "non-stitched" ciphersuites must be in use. Stitched ciphersuites are optimised implementations of certain commonly used ciphersuites. Also the application must call SSL_shutdown() twice even if a protocol error has occurred (applications should not do this but some do anyway). Fixed in OpenSSL 1.0.2r (Affected 1.0.2-1.0.2q).
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2019-1559.json"
[
{
"signature_version": "v1",
"signature_type": "Line",
"source": "https://github.com/mysql/mysql-server/commit/7d10c82196c8e45554f27c00681474a9fb86d137",
"target": {
"file": "sql/auth/sql_security_ctx.cc"
},
"deprecated": false,
"id": "CVE-2019-1559-627d45fc",
"digest": {
"line_hashes": [
"317463022452382766021103977305274585179",
"231023415934437405040826552604315029303",
"297740067960712497696382412249502119229",
"309425770541891912532229026717192392036",
"284148148647439509389511598979234415422",
"116378823324225689461236126012161469315",
"86824927962339967726030080493727111830",
"229418578243886234607155219959991524149",
"248333722744294557902251110539727458724",
"60562948043869069039720139670193814094",
"234065302816130076253002738647915957633",
"284004652744631390210136567077888520262",
"160922535157528631778173976280695262599",
"31363143091404555847052523631550609500",
"309255939664318821618380824832978289908",
"50551599195409746706267459404639193933",
"170240436352108084277830328958887278124",
"279197034075409124961633015511866447613",
"332791052601321667762795215187482398841"
],
"threshold": 0.9
}
},
{
"signature_version": "v1",
"signature_type": "Function",
"source": "https://github.com/mysql/mysql-server/commit/7d10c82196c8e45554f27c00681474a9fb86d137",
"target": {
"function": "Security_context::checkout_access_maps",
"file": "sql/auth/sql_security_ctx.cc"
},
"deprecated": false,
"id": "CVE-2019-1559-e648c373",
"digest": {
"length": 1080.0,
"function_hash": "66171467169832509301814870837451245409"
}
}
]