CVE-2013-1620
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
08/02/2013
Last modified:
11/04/2025
Description
The TLS implementation in Mozilla Network Security Services (NSS) does not properly consider timing side-channel attacks on a noncompliant MAC check operation during the processing of malformed CBC padding, which allows remote attackers to conduct distinguishing attacks and plaintext-recovery attacks via statistical analysis of timing data for crafted packets, a related issue to CVE-2013-0169.
Impact
Base Score 2.0
4.30
Severity 2.0
MEDIUM
Vulnerable products and versions
CPE | From | Up to |
---|---|---|
cpe:2.3:a:mozilla:network_security_services:*:*:*:*:*:*:*:* | 3.14.3 (excluding) | |
cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:* | ||
cpe:2.3:o:canonical:ubuntu_linux:11.10:*:*:*:*:*:*:* | ||
cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:* | ||
cpe:2.3:o:canonical:ubuntu_linux:12.10:*:*:*:*:*:*:* | ||
cpe:2.3:a:oracle:enterprise_manager_ops_center:11.1:*:*:*:*:*:*:* | ||
cpe:2.3:a:oracle:enterprise_manager_ops_center:12.1:*:*:*:*:*:*:* | ||
cpe:2.3:a:oracle:enterprise_manager_ops_center:12.2:*:*:*:*:*:*:* | ||
cpe:2.3:a:oracle:glassfish_communications_server:2.0:*:*:*:*:*:*:* | ||
cpe:2.3:a:oracle:glassfish_server:2.1.1:*:*:*:*:*:*:* | ||
cpe:2.3:a:oracle:iplanet_web_proxy_server:4.0:*:*:*:*:*:*:* | ||
cpe:2.3:a:oracle:iplanet_web_server:6.1:*:*:*:*:*:*:* | ||
cpe:2.3:a:oracle:iplanet_web_server:7.0:*:*:*:*:*:*:* | ||
cpe:2.3:a:oracle:opensso:3.0-03:*:*:*:*:*:*:* | ||
cpe:2.3:a:oracle:traffic_director:11.1.1.6.0:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10761
- http://lists.opensuse.org/opensuse-security-announce/2013-04/msg00009.html
- http://lists.opensuse.org/opensuse-security-announce/2013-04/msg00010.html
- http://openwall.com/lists/oss-security/2013/02/05/24
- http://rhn.redhat.com/errata/RHSA-2013-1135.html
- http://rhn.redhat.com/errata/RHSA-2013-1144.html
- http://seclists.org/fulldisclosure/2014/Dec/23
- http://security.gentoo.org/glsa/glsa-201406-19.xml
- http://www.isg.rhul.ac.uk/tls/TLStiming.pdf
- http://www.oracle.com/technetwork/topics/security/cpuapr2014-1972952.html
- http://www.oracle.com/technetwork/topics/security/cpujan2014-1972949.html
- http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html
- http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html
- http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html
- http://www.securityfocus.com/archive/1/534161/100/0/threaded
- http://www.securityfocus.com/bid/57777
- http://www.securityfocus.com/bid/64758
- http://www.ubuntu.com/usn/USN-1763-1
- http://www.vmware.com/security/advisories/VMSA-2014-0012.html
- http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10761
- http://lists.opensuse.org/opensuse-security-announce/2013-04/msg00009.html
- http://lists.opensuse.org/opensuse-security-announce/2013-04/msg00010.html
- http://openwall.com/lists/oss-security/2013/02/05/24
- http://rhn.redhat.com/errata/RHSA-2013-1135.html
- http://rhn.redhat.com/errata/RHSA-2013-1144.html
- http://seclists.org/fulldisclosure/2014/Dec/23
- http://security.gentoo.org/glsa/glsa-201406-19.xml
- http://www.isg.rhul.ac.uk/tls/TLStiming.pdf
- http://www.oracle.com/technetwork/topics/security/cpuapr2014-1972952.html
- http://www.oracle.com/technetwork/topics/security/cpujan2014-1972949.html
- http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html
- http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html
- http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html
- http://www.securityfocus.com/archive/1/534161/100/0/threaded
- http://www.securityfocus.com/bid/57777
- http://www.securityfocus.com/bid/64758
- http://www.ubuntu.com/usn/USN-1763-1
- http://www.vmware.com/security/advisories/VMSA-2014-0012.html