CVE-2013-0169

Priority
Description
The TLS protocol 1.1 and 1.2 and the DTLS protocol 1.0 and 1.2, as used in
OpenSSL, OpenJDK, PolarSSL, and other products, do not properly consider
timing side-channel attacks on a MAC check requirement during the
processing of malformed CBC padding, which allows remote attackers to
conduct distinguishing attacks and plaintext-recovery attacks via
statistical analysis of timing data for crafted packets, aka the "Lucky
Thirteen" issue.
Assigned-to
mdeslaur
Notes
jdstrand1.0.1d has incorrect fix. Use 1.0.1e:
mdeslaurregression bug: http://rt.openssl.org/Ticket/Display.html?id=2975&user=guest&pass=guest
1.0.1e still contains another regression:
another regression: http://rt.openssl.org/Ticket/Display.html?id=2984&user=guest&pass=guest
OpenSSL fix reverted by 1732-2 because of regression
(see: https://bugs.launchpad.net/ubuntu/+source/openssl/+bug/1133333)
(see: http://rt.openssl.org/Ticket/Display.html?id=3002)
(see: bugs.debian.org/cgi-bin/bugreport.cgi?bug=701868)
Package
Upstream:released (6b27-1.12.3)
Ubuntu 14.04 ESM (Trusty Tahr):DNE (trusty was released [6b27-1.12.3-1ubuntu1])
Package
Upstream:pending (7u13-2.3.7)
Ubuntu 14.04 ESM (Trusty Tahr):DNE (trusty was released [7u15-2.3.7-1ubuntu1])
Package
Upstream:released (0.9.8y, 1.0.0k, 1.0.1e)
Ubuntu 14.04 ESM (Trusty Tahr):released (1.0.1c-4ubuntu8)
Package
Upstream:released (0.9.8y)
Ubuntu 14.04 ESM (Trusty Tahr):DNE (trusty was released [0.9.8o-7ubuntu3.2.14.04.1])
More Information

Updated: 2020-09-10 02:28:21 UTC (commit 81a23a978c4436cd99e1d040e9e73e9146876281)