Vulnerability Description
The TLS and DTLS implementations in wolfSSL CyaSSL before 2.5.0 do not properly consider timing side-channel attacks on a noncompliant MAC check operation during the processing of malformed CBC padding, which allows remote attackers to conduct distinguishing attacks and plaintext-recovery attacks via statistical analysis of timing data for crafted packets, a related issue to CVE-2013-0169.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Yassl | Cyassl | <= 2.4.6 |
Related Weaknesses (CWE)
References
- http://openwall.com/lists/oss-security/2013/02/05/24
- http://secunia.com/advisories/53372
- http://security.gentoo.org/glsa/glsa-201308-06.xml
- http://www.isg.rhul.ac.uk/tls/TLStiming.pdf
- http://www.yassl.com/yaSSL/Blog/Entries/2013/2/5_WolfSSL%2C_provider_of_CyaSSL_E
- http://openwall.com/lists/oss-security/2013/02/05/24
- http://secunia.com/advisories/53372
- http://security.gentoo.org/glsa/glsa-201308-06.xml
- http://www.isg.rhul.ac.uk/tls/TLStiming.pdf
- http://www.yassl.com/yaSSL/Blog/Entries/2013/2/5_WolfSSL%2C_provider_of_CyaSSL_E
FAQ
What is CVE-2013-1623?
CVE-2013-1623 is a vulnerability with a CVSS score of 4.3 (MEDIUM). The TLS and DTLS implementations in wolfSSL CyaSSL before 2.5.0 do not properly consider timing side-channel attacks on a noncompliant MAC check operation during the processing of malformed CBC paddin...
How severe is CVE-2013-1623?
CVE-2013-1623 has been rated MEDIUM with a CVSS base score of 4.3/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2013-1623?
Check the references section above for vendor advisories and patch information. Affected products include: Yassl Cyassl.