Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2013-1624

Опубликовано: 04 фев. 2013
Источник: redhat
CVSS2: 5.1

Описание

The TLS implementation in the Bouncy Castle Java library before 1.48 and C# library before 1.8 does not properly consider timing side-channel attacks on a noncompliant MAC check operation during the processing of malformed CBC padding, which allows remote attackers to conduct distinguishing attacks and plaintext-recovery attacks via statistical analysis of timing data for crafted packets, a related issue to CVE-2013-0169.

It was discovered that bouncycastle leaked timing information when decrypting TLS/SSL protocol encrypted records when CBC-mode cipher suites were used. A remote attacker could possibly use this flaw to retrieve plain text from the encrypted packets by using a TLS/SSL server as a padding oracle.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
OpenShift Enterprise 1bouncycastleWill not fix
Red Hat BPM Suite 6bouncycastleAffected
Red Hat Enterprise Virtualization 3jasperreports-server-proNot affected
Red Hat JBoss BRMS 5bouncycastleWill not fix
Red Hat JBoss BRMS 6bouncycastleAffected
Red Hat JBoss Enterprise Web Server 1amq-6Affected
Red Hat JBoss Enterprise Web Server 1fuse-6Affected
Red Hat JBoss Enterprise Web Server 1fuse-enterprise-esb-7Will not fix
Red Hat JBoss Enterprise Web Server 1fuse-mq-enterprise-7Will not fix
Red Hat JBoss Enterprise Web Server 1fuse-othersWill not fix

Показывать по

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-385
https://bugzilla.redhat.com/show_bug.cgi?id=908428bouncycastle: TLS CBC padding timing attack

5.1 Medium

CVSS2

Связанные уязвимости

ubuntu
почти 13 лет назад

The TLS implementation in the Bouncy Castle Java library before 1.48 and C# library before 1.8 does not properly consider timing side-channel attacks on a noncompliant MAC check operation during the processing of malformed CBC padding, which allows remote attackers to conduct distinguishing attacks and plaintext-recovery attacks via statistical analysis of timing data for crafted packets, a related issue to CVE-2013-0169.

nvd
почти 13 лет назад

The TLS implementation in the Bouncy Castle Java library before 1.48 and C# library before 1.8 does not properly consider timing side-channel attacks on a noncompliant MAC check operation during the processing of malformed CBC padding, which allows remote attackers to conduct distinguishing attacks and plaintext-recovery attacks via statistical analysis of timing data for crafted packets, a related issue to CVE-2013-0169.

debian
почти 13 лет назад

The TLS implementation in the Bouncy Castle Java library before 1.48 a ...

github
больше 3 лет назад

Improper Input Validation in Bouncy Castle

5.1 Medium

CVSS2

Уязвимость CVE-2013-1624