CVE-2013-1623
The TLS and DTLS implementations in wolfSSL CyaSSL before 2.5.0 do not properly consider timing side-channel attacks on a noncompliant MAC check operation during the processing of malformed CBC padding, which allows remote attackers to conduct distinguishing attacks and plaintext-recovery attacks via statistical analysis of timing data for crafted packets, a related issue to CVE-2013-0169.Enginsight
Vendor | Product | Version |
---|---|---|
yassl | cyassl | 𝑥 ≤ 2.4.6 |
yassl | cyassl | 0.2.0 |
yassl | cyassl | 0.3.0 |
yassl | cyassl | 0.4.0 |
yassl | cyassl | 0.5.0 |
yassl | cyassl | 0.5.5 |
yassl | cyassl | 0.6.0 |
yassl | cyassl | 0.6.2 |
yassl | cyassl | 0.6.3 |
yassl | cyassl | 0.8.0 |
yassl | cyassl | 0.9.0 |
yassl | cyassl | 0.9.6 |
yassl | cyassl | 0.9.8 |
yassl | cyassl | 0.9.9 |
yassl | cyassl | 1.0.0 |
yassl | cyassl | 1.0.0 |
yassl | cyassl | 1.0.0 |
yassl | cyassl | 1.0.2 |
yassl | cyassl | 1.0.3 |
yassl | cyassl | 1.0.6 |
yassl | cyassl | 1.1.0 |
yassl | cyassl | 1.2.0 |
yassl | cyassl | 1.3.0 |
yassl | cyassl | 1.4.0 |
yassl | cyassl | 1.5.0 |
yassl | cyassl | 1.5.4 |
yassl | cyassl | 1.5.6 |
yassl | cyassl | 1.6.0 |
yassl | cyassl | 1.6.5 |
yassl | cyassl | 1.8.0 |
yassl | cyassl | 1.9.0 |
yassl | cyassl | 2.0.0 |
yassl | cyassl | 2.0.0 |
yassl | cyassl | 2.0.0 |
yassl | cyassl | 2.0.2 |
yassl | cyassl | 2.0.6 |
yassl | cyassl | 2.0.8 |
yassl | cyassl | 2.2.0 |
yassl | cyassl | 2.3.0 |
yassl | cyassl | 2.4.0 |
Ubuntu Releases
Common Weakness Enumeration