CVE-2013-1623

medium
New! CVE Severity Now Using CVSS v3

The calculated severity for CVEs has been updated to use CVSS v3 by default. CVEs that do not have a CVSS v3 score will fall back CVSS v2 for calculating severity. Severity display preferences can be toggled in the settings dropdown.

Description

The TLS and DTLS implementations in wolfSSL CyaSSL before 2.5.0 do not properly consider timing side-channel attacks on a noncompliant MAC check operation during the processing of malformed CBC padding, which allows remote attackers to conduct distinguishing attacks and plaintext-recovery attacks via statistical analysis of timing data for crafted packets, a related issue to CVE-2013-0169.

References

http://openwall.com/lists/oss-security/2013/02/05/24

http://secunia.com/advisories/53372

http://security.gentoo.org/glsa/glsa-201308-06.xml

http://www.isg.rhul.ac.uk/tls/TLStiming.pdf

http://www.yassl.com/yaSSL/Blog/Entries/2013/2/5_WolfSSL%2C_provider_of_CyaSSL_Embedded_SSL%2C_releases_first_embedded_TLS_and_DTLS_protocol_fix_for_Lucky_Thirteen_Attack.html

Details

Source: MITRE

Published: 2013-02-08

Updated: 2014-02-21

Type: CWE-310

Risk Information

CVSS v2

Base Score: 4.3

Vector: AV:N/AC:M/Au:N/C:P/I:N/A:N

Impact Score: 2.9

Exploitability Score: 8.6

Severity: MEDIUM

Vulnerable Software

Configuration 1

OR

cpe:2.3:a:yassl:cyassl:0.2.0:*:*:*:*:*:*:*

cpe:2.3:a:yassl:cyassl:0.3.0:*:*:*:*:*:*:*

cpe:2.3:a:yassl:cyassl:0.4.0:*:*:*:*:*:*:*

cpe:2.3:a:yassl:cyassl:0.5.0:*:*:*:*:*:*:*

cpe:2.3:a:yassl:cyassl:0.5.5:*:*:*:*:*:*:*

cpe:2.3:a:yassl:cyassl:0.6.0:*:*:*:*:*:*:*

cpe:2.3:a:yassl:cyassl:0.6.2:*:*:*:*:*:*:*

cpe:2.3:a:yassl:cyassl:0.6.3:*:*:*:*:*:*:*

cpe:2.3:a:yassl:cyassl:0.8.0:*:*:*:*:*:*:*

cpe:2.3:a:yassl:cyassl:0.9.0:*:*:*:*:*:*:*

cpe:2.3:a:yassl:cyassl:0.9.6:*:*:*:*:*:*:*

cpe:2.3:a:yassl:cyassl:0.9.8:*:*:*:*:*:*:*

cpe:2.3:a:yassl:cyassl:0.9.9:*:*:*:*:*:*:*

cpe:2.3:a:yassl:cyassl:1.0.0:rc1:*:*:*:*:*:*

cpe:2.3:a:yassl:cyassl:1.0.0:rc2:*:*:*:*:*:*

cpe:2.3:a:yassl:cyassl:1.0.0:rc3:*:*:*:*:*:*

cpe:2.3:a:yassl:cyassl:1.0.2:*:*:*:*:*:*:*

cpe:2.3:a:yassl:cyassl:1.0.3:*:*:*:*:*:*:*

cpe:2.3:a:yassl:cyassl:1.0.6:*:*:*:*:*:*:*

cpe:2.3:a:yassl:cyassl:1.1.0:*:*:*:*:*:*:*

cpe:2.3:a:yassl:cyassl:1.2.0:*:*:*:*:*:*:*

cpe:2.3:a:yassl:cyassl:1.3.0:*:*:*:*:*:*:*

cpe:2.3:a:yassl:cyassl:1.4.0:*:*:*:*:*:*:*

cpe:2.3:a:yassl:cyassl:1.5.0:*:*:*:*:*:*:*

cpe:2.3:a:yassl:cyassl:1.5.4:*:*:*:*:*:*:*

cpe:2.3:a:yassl:cyassl:1.5.6:*:*:*:*:*:*:*

cpe:2.3:a:yassl:cyassl:1.6.0:*:*:*:*:*:*:*

cpe:2.3:a:yassl:cyassl:1.6.5:*:*:*:*:*:*:*

cpe:2.3:a:yassl:cyassl:1.8.0:*:*:*:*:*:*:*

cpe:2.3:a:yassl:cyassl:1.9.0:*:*:*:*:*:*:*

cpe:2.3:a:yassl:cyassl:2.0.0:rc1:*:*:*:*:*:*

cpe:2.3:a:yassl:cyassl:2.0.0:rc2:*:*:*:*:*:*

cpe:2.3:a:yassl:cyassl:2.0.0:rc3:*:*:*:*:*:*

cpe:2.3:a:yassl:cyassl:2.0.2:*:*:*:*:*:*:*

cpe:2.3:a:yassl:cyassl:2.0.6:*:*:*:*:*:*:*

cpe:2.3:a:yassl:cyassl:2.0.8:*:*:*:*:*:*:*

cpe:2.3:a:yassl:cyassl:2.2.0:*:*:*:*:*:*:*

cpe:2.3:a:yassl:cyassl:2.3.0:*:*:*:*:*:*:*

cpe:2.3:a:yassl:cyassl:2.4.0:*:*:*:*:*:*:*

cpe:2.3:a:yassl:cyassl:*:*:*:*:*:*:*:* versions up to 2.4.6 (inclusive)

Tenable Plugins

View all (3 total)

IDNameProductFamilySeverity
69508GLSA-201308-06 : MySQL: Multiple vulnerabilitiesNessusGentoo Local Security Checks
medium
66231Ubuntu 13.04 : mysql-5.5 vulnerabilities (USN-1807-2)NessusUbuntu Local Security Checks
high
66215Ubuntu 10.04 LTS / 11.10 / 12.04 LTS / 12.10 : mysql-5.1, mysql-5.5, mysql-dfsg-5.1 vulnerabilities (USN-1807-1)NessusUbuntu Local Security Checks
high