CVE-2013-0169
Public on 2013-02-08
Modified on 2014-09-18
Description
The TLS protocol 1.1 and 1.2 and the DTLS protocol 1.0 and 1.2, as used in OpenSSL, OpenJDK, PolarSSL, and other products, do not properly consider timing side-channel attacks on a MAC check requirement during the processing of malformed CBC padding, which allows remote attackers to conduct distinguishing attacks and plaintext-recovery attacks via statistical analysis of timing data for crafted packets, aka the "Lucky Thirteen" issue.
Severity
See what this means
CVSS v3 Base Score
See breakdown
Affected Packages
| Platform | Package | Release Date | Advisory | Status |
|---|---|---|---|---|
| Amazon Linux 1 | java-1.6.0-openjdk | 2013-03-02 | ALAS-2013-163 | Fixed |
| Amazon Linux 1 | java-1.7.0-openjdk | 2013-03-02 | ALAS-2013-162 | Fixed |
| Amazon Linux 1 | openssl | 2013-03-14 | ALAS-2013-171 | Fixed |
| Amazon Linux 1 | openssl | 2014-04-07 | ALAS-2014-320 | Fixed |
CVSS Scores
| Score Type | Score | Vector | |
|---|---|---|---|
| Amazon Linux | CVSSv2 | 5.1 | AV:N/AC:H/Au:N/C:P/I:P/A:P |