Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2013-0169

Опубликовано: 08 фев. 2013
Источник: debian
EPSS Низкий

Описание

The TLS protocol 1.1 and 1.2 and the DTLS protocol 1.0 and 1.2, as used in OpenSSL, OpenJDK, PolarSSL, and other products, do not properly consider timing side-channel attacks on a MAC check requirement during the processing of malformed CBC padding, which allows remote attackers to conduct distinguishing attacks and plaintext-recovery attacks via statistical analysis of timing data for crafted packets, aka the "Lucky Thirteen" issue.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
opensslfixed1.0.1e-1package
bouncycastlefixed1.48+dfsg-2package
bouncycastleno-dsawheezypackage
bouncycastleno-dsasqueezepackage
polarsslfixed1.1.4-2package
nssfixed2:3.14.3-1package
nssno-dsasqueezepackage
openjdk-7fixed7u3-2.1.6-1package
openjdk-6fixed6b27-1.12.3-1package
gnutls26fixed2.12.20-4package
gnutls26no-dsasqueezepackage
gnutls28fixed3.0.22-3package
cyasslfixed2.9.4+dfsg-1package
matrixsslremovedpackage
matrixsslno-dsasqueezepackage
matrixsslno-dsawheezypackage
tlsliteremovedpackage
tlsliteno-dsawheezypackage

Примечания

  • matrixssl fixed this upstream in 3.4.1

  • http://www.isg.rhul.ac.uk/tls/TLStiming.pdf

EPSS

Процентиль: 76%
0.01022
Низкий

Связанные уязвимости

ubuntu
больше 12 лет назад

The TLS protocol 1.1 and 1.2 and the DTLS protocol 1.0 and 1.2, as used in OpenSSL, OpenJDK, PolarSSL, and other products, do not properly consider timing side-channel attacks on a MAC check requirement during the processing of malformed CBC padding, which allows remote attackers to conduct distinguishing attacks and plaintext-recovery attacks via statistical analysis of timing data for crafted packets, aka the "Lucky Thirteen" issue.

redhat
больше 12 лет назад

The TLS protocol 1.1 and 1.2 and the DTLS protocol 1.0 and 1.2, as used in OpenSSL, OpenJDK, PolarSSL, and other products, do not properly consider timing side-channel attacks on a MAC check requirement during the processing of malformed CBC padding, which allows remote attackers to conduct distinguishing attacks and plaintext-recovery attacks via statistical analysis of timing data for crafted packets, aka the "Lucky Thirteen" issue.

nvd
больше 12 лет назад

The TLS protocol 1.1 and 1.2 and the DTLS protocol 1.0 and 1.2, as used in OpenSSL, OpenJDK, PolarSSL, and other products, do not properly consider timing side-channel attacks on a MAC check requirement during the processing of malformed CBC padding, which allows remote attackers to conduct distinguishing attacks and plaintext-recovery attacks via statistical analysis of timing data for crafted packets, aka the "Lucky Thirteen" issue.

github
около 3 лет назад

The TLS protocol 1.1 and 1.2 and the DTLS protocol 1.0 and 1.2, as used in OpenSSL, OpenJDK, PolarSSL, and other products, do not properly consider timing side-channel attacks on a MAC check requirement during the processing of malformed CBC padding, which allows remote attackers to conduct distinguishing attacks and plaintext-recovery attacks via statistical analysis of timing data for crafted packets, aka the "Lucky Thirteen" issue.

oracle-oval
больше 12 лет назад

ELSA-2013-0274: java-1.6.0-openjdk security update (IMPORTANT)

EPSS

Процентиль: 76%
0.01022
Низкий