CVE-2013-0169
Public on 2013-02-08
Modified on 2014-09-18
Description
The TLS protocol 1.1 and 1.2 and the DTLS protocol 1.0 and 1.2, as used in OpenSSL, OpenJDK, PolarSSL, and other products, do not properly consider timing side-channel attacks on a MAC check requirement during the processing of malformed CBC padding, which allows remote attackers to conduct distinguishing attacks and plaintext-recovery attacks via statistical analysis of timing data for crafted packets, aka the "Lucky Thirteen" issue.
Severity
CVSS v3 Base Score
See breakdown
Affected Packages
Platform | Package | Release Date | Advisory | Status |
---|---|---|---|---|
Amazon Linux 1 | java-1.6.0-openjdk | 2013-03-02 | ALAS-2013-163 | Fixed |
Amazon Linux 1 | java-1.7.0-openjdk | 2013-03-02 | ALAS-2013-162 | Fixed |
Amazon Linux 1 | openssl | 2013-03-14 | ALAS-2013-171 | Fixed |
Amazon Linux 1 | openssl | 2014-04-07 | ALAS-2014-320 | Fixed |
CVSS Scores
Score Type | Score | Vector | |
---|---|---|---|
Amazon Linux | CVSSv2 | 5.1 | AV:N/AC:H/Au:N/C:P/I:P/A:P |
NVD | CVSSv2 | 2.6 | AV:N/AC:H/Au:N/C:P/I:N/A:N |