Vulnerability Description
The TLS implementation in Opera before 12.13 does not properly consider timing side-channel attacks on a MAC check operation during the processing of malformed CBC padding, which allows remote attackers to conduct distinguishing attacks and plaintext-recovery attacks via statistical analysis of timing data for crafted packets, a related issue to CVE-2013-0169.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Opera | Opera Browser | <= 12.12 |
Related Weaknesses (CWE)
References
- http://lists.opensuse.org/opensuse-updates/2013-02/msg00038.html
- http://openwall.com/lists/oss-security/2013/02/05/24
- http://www.isg.rhul.ac.uk/tls/TLStiming.pdf
- http://www.opera.com/docs/changelogs/unified/1213/
- http://www.opera.com/support/kb/view/1044/Vendor Advisory
- http://lists.opensuse.org/opensuse-updates/2013-02/msg00038.html
- http://openwall.com/lists/oss-security/2013/02/05/24
- http://www.isg.rhul.ac.uk/tls/TLStiming.pdf
- http://www.opera.com/docs/changelogs/unified/1213/
- http://www.opera.com/support/kb/view/1044/Vendor Advisory
FAQ
What is CVE-2013-1618?
CVE-2013-1618 is a vulnerability with a CVSS score of 4.0 (MEDIUM). The TLS implementation in Opera before 12.13 does not properly consider timing side-channel attacks on a MAC check operation during the processing of malformed CBC padding, which allows remote attacke...
How severe is CVE-2013-1618?
CVE-2013-1618 has been rated MEDIUM with a CVSS base score of 4.0/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2013-1618?
Check the references section above for vendor advisories and patch information. Affected products include: Opera Opera Browser.