CVE-2013-1620
Published Feb 8, 2013
Last updated 2 years ago
Overview
- Description
- The TLS implementation in Mozilla Network Security Services (NSS) does not properly consider timing side-channel attacks on a noncompliant MAC check operation during the processing of malformed CBC padding, which allows remote attackers to conduct distinguishing attacks and plaintext-recovery attacks via statistical analysis of timing data for crafted packets, a related issue to CVE-2013-0169.
- Source
- cve@mitre.org
- NVD status
- Analyzed
Social media
- Hype score
- Not currently trending
Risk scores
CVSS 2.0
- Type
- Primary
- Base score
- 4.3
- Impact score
- 2.9
- Exploitability score
- 8.6
- Vector string
- AV:N/AC:M/Au:N/C:P/I:N/A:N
Weaknesses
- nvd@nist.gov
- CWE-203
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:mozilla:network_security_services:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "678B1E05-61E2-4D39-9E97-9ED904C08C64", "versionEndExcluding": "3.14.3" } ], "operator": "OR" } ] }, { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*", "vulnerable": true, "matchCriteriaId": "01EDA41C-6B2E-49AF-B503-EB3882265C11" }, { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:11.10:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E4174F4F-149E-41A6-BBCC-D01114C05F38" }, { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*", "vulnerable": true, "matchCriteriaId": "CB66DB75-2B16-4EBF-9B93-CE49D8086E41" }, { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:12.10:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E2076871-2E80-4605-A470-A41C1A8EC7EE" } ], "operator": "OR" } ] }, { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:oracle:enterprise_manager_ops_center:11.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "5E71A360-F385-4148-9C21-339D337EC3B2" }, { "criteria": "cpe:2.3:a:oracle:enterprise_manager_ops_center:12.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "EB0370B1-0A34-4CC5-B45C-AE3A5D3ABF5A" }, { "criteria": "cpe:2.3:a:oracle:enterprise_manager_ops_center:12.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D8590A7B-CDAC-43EC-9D61-6FE4F8FCEB89" }, { "criteria": "cpe:2.3:a:oracle:glassfish_communications_server:2.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "B579EB86-B401-4EF5-A2EB-5A2B7DCD3664" }, { "criteria": "cpe:2.3:a:oracle:glassfish_server:2.1.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "0E80F5AC-A2EF-4D8A-AE8F-5DD0FF9B48C2" }, { "criteria": "cpe:2.3:a:oracle:iplanet_web_proxy_server:4.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "AE9E3545-A799-427A-8FE4-1E8231A7A284" }, { "criteria": "cpe:2.3:a:oracle:iplanet_web_server:6.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "89537672-E131-4304-A7A7-D3313E3AFC24" }, { "criteria": "cpe:2.3:a:oracle:iplanet_web_server:7.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "A972CA67-3909-4E9A-B8FC-7AAE5126528A" }, { "criteria": "cpe:2.3:a:oracle:opensso:3.0-03:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "BD26723D-B540-4E20-ABA3-6B04AF27755F" }, { "criteria": "cpe:2.3:a:oracle:traffic_director:11.1.1.6.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "8934FD3F-B3FD-42F1-8804-187099C01EA7" }, { "criteria": "cpe:2.3:a:oracle:traffic_director:11.1.1.7.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "FEFBE568-3193-45BA-92D1-D5E47C09DDEE" }, { "criteria": "cpe:2.3:a:oracle:vm_server:3.2:*:*:*:*:*:x86:*", "vulnerable": true, "matchCriteriaId": "FC9E8528-0FB8-4BF0-A9EF-6CC84A2631A1" } ], "operator": "OR" } ] }, { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "133AAFA7-AF42-4D7B-8822-AA2E85611BF5" }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "EE249E1B-A1FD-4E08-AA71-A0E1F10FFE97" }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_eus:5.9:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "6252E88C-27FF-420D-A64A-C34124CF7E6A" }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "54D669D4-6D7E-449D-80C1-28FA44F06FFE" }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "9BBCD86A-E6C7-4444-9D74-F861084090F0" }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_server_aus:5.9:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "92C9F1C4-55B0-426D-BB5E-01372C23AF97" }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D0AC5CD5-6E58-433C-9EB3-6DFE5656463E" }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E5ED5807-55B7-47C5-97A6-03233F4FBC3A" } ], "operator": "OR" } ] } ]