Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

nvd логотип

CVE-2013-0169

Опубликовано: 08 фев. 2013
Источник: nvd
CVSS2: 2.6
EPSS Низкий

Описание

The TLS protocol 1.1 and 1.2 and the DTLS protocol 1.0 and 1.2, as used in OpenSSL, OpenJDK, PolarSSL, and other products, do not properly consider timing side-channel attacks on a MAC check requirement during the processing of malformed CBC padding, which allows remote attackers to conduct distinguishing attacks and plaintext-recovery attacks via statistical analysis of timing data for crafted packets, aka the "Lucky Thirteen" issue.

Комментарий

Per http://www.openssl.org/news/vulnerabilities.html: Fixed in OpenSSL 1.0.1d (Affected 1.0.1c, 1.0.1b, 1.0.1a, 1.0.1) Fixed in OpenSSL 1.0.0k (Affected 1.0.0j, 1.0.0i, 1.0.0g, 1.0.0f, 1.0.0e, 1.0.0d, 1.0.0c, 1.0.0b, 1.0.0a, 1.0.0) Fixed in OpenSSL 0.9.8y (Affected 0.9.8x, 0.9.8w, 0.9.8v, 0.9.8u, 0.9.8t, 0.9.8s, 0.9.8r, 0.9.8q, 0.9.8p, 0.9.8o, 0.9.8n, 0.9.8m, 0.9.8l, 0.9.8k, 0.9.8j, 0.9.8i, 0.9.8h, 0.9.8g, 0.9.8f, 0.9.8d, 0.9.8c, 0.9.8b, 0.9.8a, 0.9.8)

Affected users should upgrade to OpenSSL 1.0.1e, 1.0.0k or 0.9.8y (The fix in 1.0.1d wasn't complete, so please use 1.0.1e or later)

Ссылки

Уязвимые конфигурации

Конфигурация 1

Одно из

cpe:2.3:a:openssl:openssl:*:*:*:*:*:*:*:*
Версия от 0.9.8 (включая) до 0.9.8x (включая)
cpe:2.3:a:openssl:openssl:*:*:*:*:*:*:*:*
Версия от 1.0.0 (включая) до 1.0.0j (включая)
cpe:2.3:a:openssl:openssl:*:*:*:*:*:*:*:*
Версия от 1.0.1 (включая) до 1.0.1d (включая)
Конфигурация 2

Одно из

cpe:2.3:a:oracle:openjdk:1.6.0:-:*:*:*:*:*:*
cpe:2.3:a:oracle:openjdk:1.6.0:update1:*:*:*:*:*:*
cpe:2.3:a:oracle:openjdk:1.6.0:update10:*:*:*:*:*:*
cpe:2.3:a:oracle:openjdk:1.6.0:update11:*:*:*:*:*:*
cpe:2.3:a:oracle:openjdk:1.6.0:update12:*:*:*:*:*:*
cpe:2.3:a:oracle:openjdk:1.6.0:update13:*:*:*:*:*:*
cpe:2.3:a:oracle:openjdk:1.6.0:update14:*:*:*:*:*:*
cpe:2.3:a:oracle:openjdk:1.6.0:update15:*:*:*:*:*:*
cpe:2.3:a:oracle:openjdk:1.6.0:update16:*:*:*:*:*:*
cpe:2.3:a:oracle:openjdk:1.6.0:update17:*:*:*:*:*:*
cpe:2.3:a:oracle:openjdk:1.6.0:update18:*:*:*:*:*:*
cpe:2.3:a:oracle:openjdk:1.6.0:update19:*:*:*:*:*:*
cpe:2.3:a:oracle:openjdk:1.6.0:update2:*:*:*:*:*:*
cpe:2.3:a:oracle:openjdk:1.6.0:update20:*:*:*:*:*:*
cpe:2.3:a:oracle:openjdk:1.6.0:update21:*:*:*:*:*:*
cpe:2.3:a:oracle:openjdk:1.6.0:update22:*:*:*:*:*:*
cpe:2.3:a:oracle:openjdk:1.6.0:update23:*:*:*:*:*:*
cpe:2.3:a:oracle:openjdk:1.6.0:update24:*:*:*:*:*:*
cpe:2.3:a:oracle:openjdk:1.6.0:update25:*:*:*:*:*:*
cpe:2.3:a:oracle:openjdk:1.6.0:update26:*:*:*:*:*:*
cpe:2.3:a:oracle:openjdk:1.6.0:update27:*:*:*:*:*:*
cpe:2.3:a:oracle:openjdk:1.6.0:update29:*:*:*:*:*:*
cpe:2.3:a:oracle:openjdk:1.6.0:update3:*:*:*:*:*:*
cpe:2.3:a:oracle:openjdk:1.6.0:update30:*:*:*:*:*:*
cpe:2.3:a:oracle:openjdk:1.6.0:update31:*:*:*:*:*:*
cpe:2.3:a:oracle:openjdk:1.6.0:update32:*:*:*:*:*:*
cpe:2.3:a:oracle:openjdk:1.6.0:update33:*:*:*:*:*:*
cpe:2.3:a:oracle:openjdk:1.6.0:update34:*:*:*:*:*:*
cpe:2.3:a:oracle:openjdk:1.6.0:update35:*:*:*:*:*:*
cpe:2.3:a:oracle:openjdk:1.6.0:update37:*:*:*:*:*:*
cpe:2.3:a:oracle:openjdk:1.6.0:update38:*:*:*:*:*:*
cpe:2.3:a:oracle:openjdk:1.6.0:update4:*:*:*:*:*:*
cpe:2.3:a:oracle:openjdk:1.6.0:update5:*:*:*:*:*:*
cpe:2.3:a:oracle:openjdk:1.6.0:update6:*:*:*:*:*:*
cpe:2.3:a:oracle:openjdk:1.6.0:update7:*:*:*:*:*:*
cpe:2.3:a:oracle:openjdk:1.7.0:-:*:*:*:*:*:*
cpe:2.3:a:oracle:openjdk:1.7.0:update1:*:*:*:*:*:*
cpe:2.3:a:oracle:openjdk:1.7.0:update10:*:*:*:*:*:*
cpe:2.3:a:oracle:openjdk:1.7.0:update11:*:*:*:*:*:*
cpe:2.3:a:oracle:openjdk:1.7.0:update13:*:*:*:*:*:*
cpe:2.3:a:oracle:openjdk:1.7.0:update2:*:*:*:*:*:*
cpe:2.3:a:oracle:openjdk:1.7.0:update3:*:*:*:*:*:*
cpe:2.3:a:oracle:openjdk:1.7.0:update4:*:*:*:*:*:*
cpe:2.3:a:oracle:openjdk:1.7.0:update5:*:*:*:*:*:*
cpe:2.3:a:oracle:openjdk:1.7.0:update6:*:*:*:*:*:*
cpe:2.3:a:oracle:openjdk:1.7.0:update7:*:*:*:*:*:*
cpe:2.3:a:oracle:openjdk:1.7.0:update9:*:*:*:*:*:*
Конфигурация 3

Одно из

cpe:2.3:a:polarssl:polarssl:0.10.0:*:*:*:*:*:*:*
cpe:2.3:a:polarssl:polarssl:0.10.1:*:*:*:*:*:*:*
cpe:2.3:a:polarssl:polarssl:0.11.0:*:*:*:*:*:*:*
cpe:2.3:a:polarssl:polarssl:0.11.1:*:*:*:*:*:*:*
cpe:2.3:a:polarssl:polarssl:0.12.0:*:*:*:*:*:*:*
cpe:2.3:a:polarssl:polarssl:0.12.1:*:*:*:*:*:*:*
cpe:2.3:a:polarssl:polarssl:0.13.1:*:*:*:*:*:*:*
cpe:2.3:a:polarssl:polarssl:0.14.0:*:*:*:*:*:*:*
cpe:2.3:a:polarssl:polarssl:0.14.2:*:*:*:*:*:*:*
cpe:2.3:a:polarssl:polarssl:0.14.3:*:*:*:*:*:*:*
cpe:2.3:a:polarssl:polarssl:0.99:pre1:*:*:*:*:*:*
cpe:2.3:a:polarssl:polarssl:0.99:pre3:*:*:*:*:*:*
cpe:2.3:a:polarssl:polarssl:0.99:pre4:*:*:*:*:*:*
cpe:2.3:a:polarssl:polarssl:0.99:pre5:*:*:*:*:*:*
cpe:2.3:a:polarssl:polarssl:1.0.0:*:*:*:*:*:*:*
cpe:2.3:a:polarssl:polarssl:1.1.0:*:*:*:*:*:*:*
cpe:2.3:a:polarssl:polarssl:1.1.0:rc0:*:*:*:*:*:*
cpe:2.3:a:polarssl:polarssl:1.1.0:rc1:*:*:*:*:*:*
cpe:2.3:a:polarssl:polarssl:1.1.1:*:*:*:*:*:*:*
cpe:2.3:a:polarssl:polarssl:1.1.2:*:*:*:*:*:*:*
cpe:2.3:a:polarssl:polarssl:1.1.3:*:*:*:*:*:*:*
cpe:2.3:a:polarssl:polarssl:1.1.4:*:*:*:*:*:*:*

EPSS

Процентиль: 76%
0.01022
Низкий

2.6 Low

CVSS2

Дефекты

CWE-310

Связанные уязвимости

ubuntu
больше 12 лет назад

The TLS protocol 1.1 and 1.2 and the DTLS protocol 1.0 and 1.2, as used in OpenSSL, OpenJDK, PolarSSL, and other products, do not properly consider timing side-channel attacks on a MAC check requirement during the processing of malformed CBC padding, which allows remote attackers to conduct distinguishing attacks and plaintext-recovery attacks via statistical analysis of timing data for crafted packets, aka the "Lucky Thirteen" issue.

redhat
больше 12 лет назад

The TLS protocol 1.1 and 1.2 and the DTLS protocol 1.0 and 1.2, as used in OpenSSL, OpenJDK, PolarSSL, and other products, do not properly consider timing side-channel attacks on a MAC check requirement during the processing of malformed CBC padding, which allows remote attackers to conduct distinguishing attacks and plaintext-recovery attacks via statistical analysis of timing data for crafted packets, aka the "Lucky Thirteen" issue.

debian
больше 12 лет назад

The TLS protocol 1.1 and 1.2 and the DTLS protocol 1.0 and 1.2, as use ...

github
около 3 лет назад

The TLS protocol 1.1 and 1.2 and the DTLS protocol 1.0 and 1.2, as used in OpenSSL, OpenJDK, PolarSSL, and other products, do not properly consider timing side-channel attacks on a MAC check requirement during the processing of malformed CBC padding, which allows remote attackers to conduct distinguishing attacks and plaintext-recovery attacks via statistical analysis of timing data for crafted packets, aka the "Lucky Thirteen" issue.

oracle-oval
больше 12 лет назад

ELSA-2013-0274: java-1.6.0-openjdk security update (IMPORTANT)

EPSS

Процентиль: 76%
0.01022
Низкий

2.6 Low

CVSS2

Дефекты

CWE-310