CVE-2013-0169

Priority
Medium
Description
The TLS protocol 1.1 and 1.2 and the DTLS protocol 1.0 and 1.2, as used in
OpenSSL, OpenJDK, PolarSSL, and other products, do not properly consider
timing side-channel attacks on a MAC check requirement during the
processing of malformed CBC padding, which allows remote attackers to
conduct distinguishing attacks and plaintext-recovery attacks via
statistical analysis of timing data for crafted packets, aka the "Lucky
Thirteen" issue.
References
Bugs
Notes
 jdstrand> 1.0.1d has incorrect fix. Use 1.0.1e:
 mdeslaur> regression bug: http://rt.openssl.org/Ticket/Display.html?id=2975&user=guest&pass=guest
 mdeslaur> 1.0.1e still contains another regression:
 mdeslaur> another regression: http://rt.openssl.org/Ticket/Display.html?id=2984&user=guest&pass=guest
 mdeslaur> OpenSSL fix reverted by 1732-2 because of regression
 mdeslaur> (see: https://bugs.launchpad.net/ubuntu/+source/openssl/+bug/1133333)
 mdeslaur> (see: http://rt.openssl.org/Ticket/Display.html?id=3002)
 mdeslaur> (see: bugs.debian.org/cgi-bin/bugreport.cgi?bug=701868)
Assigned-to
mdeslaur
Package
Upstream:pending (7u13-2.3.7)
Ubuntu 12.04 LTS (Precise Pangolin):released (7u15-2.3.7-0ubuntu1~12.04)
Ubuntu 14.04 LTS (Trusty Tahr):released (7u15-2.3.7-1ubuntu1)
Package
Upstream:released (6b27-1.12.3)
Ubuntu 12.04 LTS (Precise Pangolin):released (6b27-1.12.3-0ubuntu1~12.04)
Ubuntu 14.04 LTS (Trusty Tahr):released (6b27-1.12.3-1ubuntu1)
Package
Upstream:released (0.9.8y)
Ubuntu 12.04 LTS (Precise Pangolin):released (0.9.8o-7ubuntu3.2)
Ubuntu 14.04 LTS (Trusty Tahr):released (0.9.8o-7ubuntu3.2.14.04.1)
Package
Upstream:released (0.9.8y, 1.0.0k, 1.0.1e)
Ubuntu 12.04 LTS (Precise Pangolin):released (1.0.1-4ubuntu5.8)
Ubuntu 14.04 LTS (Trusty Tahr):released (1.0.1c-4ubuntu8)
More Information

Valid XHTML 1.0 Strict

Updated: 2015-07-29 20:41:09 UTC (commit 9756)