fkie_cve-2013-1624
Vulnerability from fkie_nvd
Published
2013-02-08 19:55
Modified
2024-11-21 01:50
Severity ?
Summary
The TLS implementation in the Bouncy Castle Java library before 1.48 and C# library before 1.8 does not properly consider timing side-channel attacks on a noncompliant MAC check operation during the processing of malformed CBC padding, which allows remote attackers to conduct distinguishing attacks and plaintext-recovery attacks via statistical analysis of timing data for crafted packets, a related issue to CVE-2013-0169.
References
Impacted products
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:bouncycastle:legion-of-the-bouncy-castle-java-crytography-api:1.01:*:*:*:*:*:*:*", matchCriteriaId: "FAF60BAE-BA1B-49A3-B594-3B7336F602AD", vulnerable: true, }, { criteria: "cpe:2.3:a:bouncycastle:legion-of-the-bouncy-castle-java-crytography-api:1.02:*:*:*:*:*:*:*", matchCriteriaId: "AFDD300D-43A1-4E72-9BB6-E3141A7B3CF4", vulnerable: true, }, { criteria: "cpe:2.3:a:bouncycastle:legion-of-the-bouncy-castle-java-crytography-api:1.03:*:*:*:*:*:*:*", matchCriteriaId: "D0C5F2A1-BBE1-4EC1-8324-64A8DC19DCE9", vulnerable: true, }, { criteria: "cpe:2.3:a:bouncycastle:legion-of-the-bouncy-castle-java-crytography-api:1.04:*:*:*:*:*:*:*", matchCriteriaId: "663B6F4C-1997-4651-ADA0-E061BBCA543F", vulnerable: true, }, { criteria: "cpe:2.3:a:bouncycastle:legion-of-the-bouncy-castle-java-crytography-api:1.05:*:*:*:*:*:*:*", matchCriteriaId: "311A950B-0152-4556-B7A0-8A1D355A095D", vulnerable: true, }, { criteria: "cpe:2.3:a:bouncycastle:legion-of-the-bouncy-castle-java-crytography-api:1.06:*:*:*:*:*:*:*", matchCriteriaId: "D8778B34-92B6-41F7-AA5E-55127155C6D1", vulnerable: true, }, { criteria: "cpe:2.3:a:bouncycastle:legion-of-the-bouncy-castle-java-crytography-api:1.07:*:*:*:*:*:*:*", matchCriteriaId: "3E1EAB5C-D9FE-4499-9FF2-D7C498A5CD38", vulnerable: true, }, { criteria: "cpe:2.3:a:bouncycastle:legion-of-the-bouncy-castle-java-crytography-api:1.08:*:*:*:*:*:*:*", matchCriteriaId: "3A14408B-F008-4AFB-A3C4-E468E5D8871B", vulnerable: true, }, { criteria: "cpe:2.3:a:bouncycastle:legion-of-the-bouncy-castle-java-crytography-api:1.09:*:*:*:*:*:*:*", matchCriteriaId: "9EF6CBA3-D974-4D9D-A5C6-5E8CB9C5E7D9", vulnerable: true, }, { criteria: "cpe:2.3:a:bouncycastle:legion-of-the-bouncy-castle-java-crytography-api:1.10:*:*:*:*:*:*:*", matchCriteriaId: "02092572-B188-4A8E-9745-1E93DEA818BF", vulnerable: true, }, { criteria: "cpe:2.3:a:bouncycastle:legion-of-the-bouncy-castle-java-crytography-api:1.11:*:*:*:*:*:*:*", matchCriteriaId: "2FC51E9F-1B88-499C-B2D1-BC5B1427F5AB", vulnerable: true, }, { criteria: "cpe:2.3:a:bouncycastle:legion-of-the-bouncy-castle-java-crytography-api:1.12:*:*:*:*:*:*:*", matchCriteriaId: "C5FC15CF-FC0E-4E74-9936-546E51C86975", vulnerable: true, }, { criteria: "cpe:2.3:a:bouncycastle:legion-of-the-bouncy-castle-java-crytography-api:1.13:*:*:*:*:*:*:*", matchCriteriaId: "318F8819-2E27-4E5C-A62E-DBEE060AACD6", vulnerable: true, }, { criteria: "cpe:2.3:a:bouncycastle:legion-of-the-bouncy-castle-java-crytography-api:1.14:*:*:*:*:*:*:*", matchCriteriaId: "01B57AD2-B600-4949-91DE-87D3EAEEE01E", vulnerable: true, }, { criteria: "cpe:2.3:a:bouncycastle:legion-of-the-bouncy-castle-java-crytography-api:1.15:*:*:*:*:*:*:*", matchCriteriaId: "63CE9915-2F36-4EE7-AEAE-7BA641ECAD1B", vulnerable: true, }, { criteria: "cpe:2.3:a:bouncycastle:legion-of-the-bouncy-castle-java-crytography-api:1.16:*:*:*:*:*:*:*", matchCriteriaId: "E263B817-CA65-40E4-8BC9-D195A0F88E16", vulnerable: true, }, { criteria: "cpe:2.3:a:bouncycastle:legion-of-the-bouncy-castle-java-crytography-api:1.17:*:*:*:*:*:*:*", matchCriteriaId: "31451E1E-4CCA-4B8B-AEB9-9C8A9918B9C5", vulnerable: true, }, { criteria: "cpe:2.3:a:bouncycastle:legion-of-the-bouncy-castle-java-crytography-api:1.18:*:*:*:*:*:*:*", matchCriteriaId: "5A3438ED-8462-40E5-B433-9F67ED9A9110", vulnerable: true, }, { criteria: "cpe:2.3:a:bouncycastle:legion-of-the-bouncy-castle-java-crytography-api:1.19:*:*:*:*:*:*:*", matchCriteriaId: "E3258C44-1D6E-4019-B332-80505B6B7B4C", vulnerable: true, }, { criteria: "cpe:2.3:a:bouncycastle:legion-of-the-bouncy-castle-java-crytography-api:1.20:*:*:*:*:*:*:*", matchCriteriaId: "C0BB004D-1C69-4B39-890A-AE70D27518A3", vulnerable: true, }, { criteria: "cpe:2.3:a:bouncycastle:legion-of-the-bouncy-castle-java-crytography-api:1.21:*:*:*:*:*:*:*", matchCriteriaId: "2ACBC626-EDBD-4C75-87ED-C78066670140", vulnerable: true, }, { criteria: "cpe:2.3:a:bouncycastle:legion-of-the-bouncy-castle-java-crytography-api:1.22:*:*:*:*:*:*:*", matchCriteriaId: "2C3D8290-1839-4219-87C1-1A10FF5CF835", vulnerable: true, }, { criteria: "cpe:2.3:a:bouncycastle:legion-of-the-bouncy-castle-java-crytography-api:1.23:*:*:*:*:*:*:*", matchCriteriaId: "4E605FF3-E6D8-4364-B098-4265CC490AD2", vulnerable: true, }, { criteria: "cpe:2.3:a:bouncycastle:legion-of-the-bouncy-castle-java-crytography-api:1.24:*:*:*:*:*:*:*", matchCriteriaId: "E257CDDF-1D45-40F6-AF90-51B455440EA4", vulnerable: true, }, { criteria: "cpe:2.3:a:bouncycastle:legion-of-the-bouncy-castle-java-crytography-api:1.25:*:*:*:*:*:*:*", matchCriteriaId: "85AA3FAB-F49F-4CC1-86E4-A2BCC90EAA6E", vulnerable: true, }, { criteria: "cpe:2.3:a:bouncycastle:legion-of-the-bouncy-castle-java-crytography-api:1.26:*:*:*:*:*:*:*", matchCriteriaId: "5A8D2C13-72E2-4139-8EF6-2ABB21F6B199", vulnerable: true, }, { criteria: "cpe:2.3:a:bouncycastle:legion-of-the-bouncy-castle-java-crytography-api:1.27:*:*:*:*:*:*:*", matchCriteriaId: "46AFFBE0-63F9-47E0-BDE4-73E9C3A30D4F", vulnerable: true, }, { criteria: "cpe:2.3:a:bouncycastle:legion-of-the-bouncy-castle-java-crytography-api:1.28:*:*:*:*:*:*:*", matchCriteriaId: "CD114491-F727-4B7D-91C9-C20583035273", vulnerable: true, }, { criteria: "cpe:2.3:a:bouncycastle:legion-of-the-bouncy-castle-java-crytography-api:1.29:*:*:*:*:*:*:*", matchCriteriaId: "12303E74-5E98-4F98-A21C-11EE30B74FDB", vulnerable: true, }, { criteria: "cpe:2.3:a:bouncycastle:legion-of-the-bouncy-castle-java-crytography-api:1.30:*:*:*:*:*:*:*", matchCriteriaId: "B6F306E2-E7DE-45F9-880B-391F5BABE2C5", vulnerable: true, }, { criteria: "cpe:2.3:a:bouncycastle:legion-of-the-bouncy-castle-java-crytography-api:1.31:*:*:*:*:*:*:*", matchCriteriaId: "FCB1F2FE-E911-438F-8CED-A77055231E7D", vulnerable: true, }, { criteria: "cpe:2.3:a:bouncycastle:legion-of-the-bouncy-castle-java-crytography-api:1.32:*:*:*:*:*:*:*", matchCriteriaId: "C3AB6C8A-F2DD-42F7-B5B6-71E0EC1FCCCC", vulnerable: true, }, { criteria: "cpe:2.3:a:bouncycastle:legion-of-the-bouncy-castle-java-crytography-api:1.33:*:*:*:*:*:*:*", matchCriteriaId: "8FB8EA15-253A-4A29-ACD4-FCCC217CC157", vulnerable: true, }, { criteria: "cpe:2.3:a:bouncycastle:legion-of-the-bouncy-castle-java-crytography-api:1.34:*:*:*:*:*:*:*", matchCriteriaId: "0961397F-1859-41F9-A817-304D781BB050", vulnerable: true, }, { criteria: "cpe:2.3:a:bouncycastle:legion-of-the-bouncy-castle-java-crytography-api:1.35:*:*:*:*:*:*:*", matchCriteriaId: "74052375-8653-494A-A4DF-012075DE91CF", vulnerable: true, }, { criteria: "cpe:2.3:a:bouncycastle:legion-of-the-bouncy-castle-java-crytography-api:1.36:*:*:*:*:*:*:*", matchCriteriaId: "AEC6A374-2903-4E0C-A1C7-664B4F61AE92", vulnerable: true, }, { criteria: "cpe:2.3:a:bouncycastle:legion-of-the-bouncy-castle-java-crytography-api:1.37:*:*:*:*:*:*:*", matchCriteriaId: "5F0616EC-61CA-4BF2-B0AA-9904708F35DF", vulnerable: true, }, { criteria: "cpe:2.3:a:bouncycastle:legion-of-the-bouncy-castle-java-crytography-api:1.38:*:*:*:*:*:*:*", matchCriteriaId: "03F1FC36-7F65-47F2-A79F-F5EA7D3444D5", vulnerable: true, }, { criteria: "cpe:2.3:a:bouncycastle:legion-of-the-bouncy-castle-java-crytography-api:1.39:*:*:*:*:*:*:*", matchCriteriaId: "875046E1-7001-4D2A-81C4-8F391742AE4A", vulnerable: true, }, { criteria: "cpe:2.3:a:bouncycastle:legion-of-the-bouncy-castle-java-crytography-api:1.40:*:*:*:*:*:*:*", matchCriteriaId: "40B16203-995B-4813-9D44-0BA044A6618C", vulnerable: true, }, { criteria: "cpe:2.3:a:bouncycastle:legion-of-the-bouncy-castle-java-crytography-api:1.41:*:*:*:*:*:*:*", matchCriteriaId: "34785221-CC94-4271-9D23-D5259A43AAD1", vulnerable: true, }, { criteria: "cpe:2.3:a:bouncycastle:legion-of-the-bouncy-castle-java-crytography-api:1.42:*:*:*:*:*:*:*", matchCriteriaId: "B18042B7-F191-4E7A-A35A-560B80C52D62", vulnerable: true, }, { criteria: "cpe:2.3:a:bouncycastle:legion-of-the-bouncy-castle-java-crytography-api:1.43:*:*:*:*:*:*:*", matchCriteriaId: "93F59407-2608-4B0B-8EB7-9CA95C92E7F9", vulnerable: true, }, { criteria: "cpe:2.3:a:bouncycastle:legion-of-the-bouncy-castle-java-crytography-api:1.44:*:*:*:*:*:*:*", matchCriteriaId: "78B80BCC-BA28-403E-B305-EA8E607B756F", vulnerable: true, }, { criteria: "cpe:2.3:a:bouncycastle:legion-of-the-bouncy-castle-java-crytography-api:1.45:*:*:*:*:*:*:*", matchCriteriaId: "6E92AD60-8537-4D61-8C89-769D36B34BBE", vulnerable: true, }, { criteria: "cpe:2.3:a:bouncycastle:legion-of-the-bouncy-castle-java-crytography-api:1.46:*:*:*:*:*:*:*", matchCriteriaId: "1E266FA6-AB05-44BC-8DE1-B009915FFBD9", vulnerable: true, }, { criteria: "cpe:2.3:a:bouncycastle:legion-of-the-bouncy-castle-java-crytography-api:1.47:*:*:*:*:*:*:*", matchCriteriaId: "8378040B-25A8-4F2A-B632-E7F91A45DFD6", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:bouncycastle:legion-of-the-bouncy-castle-c\\#-cryptography-api:0.0:*:*:*:*:*:*:*", matchCriteriaId: "35AF4B58-7361-4D12-AADA-072A60AB0104", vulnerable: true, }, { criteria: "cpe:2.3:a:bouncycastle:legion-of-the-bouncy-castle-c\\#-cryptography-api:1.0:*:*:*:*:*:*:*", matchCriteriaId: "3BFAF5C1-7823-436C-9CA3-056F0A9D51A5", vulnerable: true, }, { criteria: "cpe:2.3:a:bouncycastle:legion-of-the-bouncy-castle-c\\#-cryptography-api:1.1:*:*:*:*:*:*:*", matchCriteriaId: "40259337-03AB-410A-82B7-AFEB4E0C1AD1", vulnerable: true, }, { criteria: "cpe:2.3:a:bouncycastle:legion-of-the-bouncy-castle-c\\#-cryptography-api:1.2:*:*:*:*:*:*:*", matchCriteriaId: "CA51EA08-2375-4F1B-8C89-ED18B2C9E683", vulnerable: true, }, { criteria: "cpe:2.3:a:bouncycastle:legion-of-the-bouncy-castle-c\\#-cryptography-api:1.3:*:*:*:*:*:*:*", matchCriteriaId: "FD8F22E0-D7C8-4ADA-9312-18F07CEF4ED4", vulnerable: true, }, { criteria: "cpe:2.3:a:bouncycastle:legion-of-the-bouncy-castle-c\\#-cryptography-api:1.4:*:*:*:*:*:*:*", matchCriteriaId: "65F5FE67-E52C-4301-A840-F91A1F5B87B3", vulnerable: true, }, { criteria: "cpe:2.3:a:bouncycastle:legion-of-the-bouncy-castle-c\\#-cryptography-api:1.5:*:*:*:*:*:*:*", matchCriteriaId: "E0BB97D9-EADD-47DB-9ABA-A92B43C2A522", vulnerable: true, }, { criteria: "cpe:2.3:a:bouncycastle:legion-of-the-bouncy-castle-c\\#-cryptography-api:1.6.1:*:*:*:*:*:*:*", matchCriteriaId: "27F9BDF0-E59A-4FD9-B868-BF7342B98B8B", vulnerable: true, }, { criteria: "cpe:2.3:a:bouncycastle:legion-of-the-bouncy-castle-c\\#-cryptography-api:1.7:*:*:*:*:*:*:*", matchCriteriaId: "8FF3240B-548F-45A4-BCC8-4E0534619375", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "The TLS implementation in the Bouncy Castle Java library before 1.48 and C# library before 1.8 does not properly consider timing side-channel attacks on a noncompliant MAC check operation during the processing of malformed CBC padding, which allows remote attackers to conduct distinguishing attacks and plaintext-recovery attacks via statistical analysis of timing data for crafted packets, a related issue to CVE-2013-0169.", }, { lang: "es", value: "La implementación de TLS en la biblioteca Java de Bouncy Castle antes v1.48 y biblioteca C# antes de v1.8 no tiene debidamente en cuenta los ataques de tiempo al canal lateral en la operación de comprobación de incumplimiento MAC durante el proceso de relleno del CBC malformado, lo que permite a atacantes remotos realizar ataques distintivos y de texto plano, ataques de recuperación a través de análisis estadísticode tiempo de los paquetes hechos a mano, una cuestión relacionada con CVE-2013-0169.", }, ], id: "CVE-2013-1624", lastModified: "2024-11-21T01:50:01.507", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "MEDIUM", cvssData: { accessComplexity: "HIGH", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "NONE", baseScore: 4, confidentialityImpact: "PARTIAL", integrityImpact: "PARTIAL", vectorString: "AV:N/AC:H/Au:N/C:P/I:P/A:N", version: "2.0", }, exploitabilityScore: 4.9, impactScore: 4.9, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], }, published: "2013-02-08T19:55:01.437", references: [ { source: "cve@mitre.org", url: "http://openwall.com/lists/oss-security/2013/02/05/24", }, { source: "cve@mitre.org", url: "http://rhn.redhat.com/errata/RHSA-2014-0371.html", }, { source: "cve@mitre.org", url: "http://rhn.redhat.com/errata/RHSA-2014-0372.html", }, { source: "cve@mitre.org", url: "http://secunia.com/advisories/57716", }, { source: "cve@mitre.org", url: "http://secunia.com/advisories/57719", }, { source: "cve@mitre.org", url: "http://www.isg.rhul.ac.uk/tls/TLStiming.pdf", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://openwall.com/lists/oss-security/2013/02/05/24", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://rhn.redhat.com/errata/RHSA-2014-0371.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://rhn.redhat.com/errata/RHSA-2014-0372.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://secunia.com/advisories/57716", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://secunia.com/advisories/57719", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.isg.rhul.ac.uk/tls/TLStiming.pdf", }, ], sourceIdentifier: "cve@mitre.org", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-310", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Log in or create an account to share your comment.
Security Advisory comment format.
This schema specifies the format of a comment related to a security advisory.
Title of the comment
Description of the comment
Loading…
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.