CVE-2013-1620

The TLS implementation in Mozilla Network Security Services (NSS) does not properly consider timing side-channel attacks on a noncompliant MAC check operation during the processing of malformed CBC padding, which allows remote attackers to conduct distinguishing attacks and plaintext-recovery attacks via statistical analysis of timing data for crafted packets, a related issue to CVE-2013-0169.
Severity
UNKNOWN
AV:N/AC:M/Au:N/C:P/I:N/A:N
Atk. Vector
NETWORK
Atk. Complexity
MEDIUM
Base Score
CVSS 3.x
EPSS Score
Percentile: 78%
VendorProductVersion
mozillanetwork_security_services
𝑥
< 3.14.3
canonicalubuntu_linux
10.04
canonicalubuntu_linux
11.10
canonicalubuntu_linux
12.04
canonicalubuntu_linux
12.10
oracleenterprise_manager_ops_center
11.1
oracleenterprise_manager_ops_center
12.1
oracleenterprise_manager_ops_center
12.2
oracleglassfish_communications_server
2.0
oracleglassfish_server
2.1.1
oracleiplanet_web_proxy_server
4.0
oracleiplanet_web_server
6.1
oracleiplanet_web_server
7.0
oracleopensso
3.0-03
oracletraffic_director
11.1.1.6.0
oracletraffic_director
11.1.1.7.0
oraclevm_server
3.2
redhatenterprise_linux_desktop
5.0
redhatenterprise_linux_desktop
6.0
redhatenterprise_linux_eus
5.9
redhatenterprise_linux_server
5.0
redhatenterprise_linux_server
6.0
redhatenterprise_linux_server_aus
5.9
redhatenterprise_linux_workstation
5.0
redhatenterprise_linux_workstation
6.0
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
nss
bullseye
2:3.61-1+deb11u3
fixed
squeeze
no-dsa
bullseye (security)
2:3.61-1+deb11u4
fixed
bookworm
2:3.87.1-1
fixed
sid
2:3.105-2
fixed
trixie
2:3.105-2
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
nss
quantal
Fixed 3.14.3-0ubuntu0.12.10.1
released
precise
Fixed 3.14.3-0ubuntu0.12.04.1
released
oneiric
Fixed 3.14.3-0ubuntu0.11.10.1
released
lucid
Fixed 3.14.3-0ubuntu0.10.04.1
released
hardy
ignored
References