Vulnerability   
Search   
    Search 324607 CVE descriptions
and 145615 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.0.142730
Category:General
Title:OpenSSL Default Installation Paths Vulnerability (CVE-2019-1552) - Windows
Summary:OpenSSL on Windows is prone to an insecure path defaults vulnerability.
Description:Summary:
OpenSSL on Windows is prone to an insecure path defaults vulnerability.

Vulnerability Insight:
OpenSSL has internal defaults for a directory tree where it can find a
configuration file as well as certificates used for verification in TLS. This directory is most commonly referred
to as OPENSSLDIR, and is configurable with the --prefix / --openssldir configuration options.

For OpenSSL versions 1.1.0 and 1.1.1, the mingw configuration targets assume that resulting programs and
libraries are installed in a Unix-like environment and the default prefix for program installation as well as for
OPENSSLDIR should be '/usr/local'.

However, mingw programs are Windows programs, and as such, find themselves looking at sub-directories of
'C:/usr/local', which may be world writable, which enables untrusted users to modify OpenSSL's default
configuration, insert CA certificates, modify (or even replace) existing engine modules, etc.

For OpenSSL 1.0.2, '/usr/local/ssl' is used as default for OPENSSLDIR on all Unix and Windows targets, including
Visual C builds. However, some build instructions for the diverse Windows targets on 1.0.2 encourage you to
specify your own --prefix.

Affected Software/OS:
OpenSSL versions 1.0.2 through 1.0.2s, 1.1.0 through 1.1.0k and 1.1.1 through 1.1.1c.

Solution:
Apply the provided patches or update to a newer version.

CVSS Score:
1.9

CVSS Vector:
AV:L/AC:M/Au:N/C:N/I:P/A:N

Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2019-1552
CERT/CC vulnerability note: VU#429301
https://www.kb.cert.org/vuls/id/429301
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=54aa9d51b09d67e90db443f682cface795f5af9e
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=b15a19c148384e73338aa7c5b12652138e35ed28
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=d333ebaf9c77332754a9d5e111e2f53e1de54fdd
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=e32bc855a81a2d48d215c506bdeb4f598045f7e9
https://security.netapp.com/advisory/ntap-20190823-0006/
https://support.f5.com/csp/article/K94041354
https://support.f5.com/csp/article/K94041354?utm_source=f5support&utm_medium=RSS
https://www.openssl.org/news/secadv/20190730.txt
https://www.tenable.com/security/tns-2019-08
https://www.tenable.com/security/tns-2019-09
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZBEV5QGDRFUZDMNECFXUSN5FMYOZDE4V/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Y3IVFGSERAZLNJCK35TEM2R4726XIH3Z/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EWC42UXL5GHTU5G77VKBF6JYUUNGSHOM/
https://www.oracle.com/security-alerts/cpuapr2020.html
https://www.oracle.com/security-alerts/cpujan2020.html
https://www.oracle.com/security-alerts/cpujul2020.html
https://www.oracle.com/security-alerts/cpuoct2020.html
https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html
CopyrightCopyright (C) 2019 Greenbone AG

This is only one of 145615 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.




© 1998-2025 E-Soft Inc. All rights reserved.