Vulnerability Details : CVE-2013-1623
The TLS and DTLS implementations in wolfSSL CyaSSL before 2.5.0 do not properly consider timing side-channel attacks on a noncompliant MAC check operation during the processing of malformed CBC padding, which allows remote attackers to conduct distinguishing attacks and plaintext-recovery attacks via statistical analysis of timing data for crafted packets, a related issue to CVE-2013-0169.
Products affected by CVE-2013-1623
- cpe:2.3:a:yassl:cyassl:*:*:*:*:*:*:*:*
- cpe:2.3:a:yassl:cyassl:2.0.0:rc2:*:*:*:*:*:*
- cpe:2.3:a:yassl:cyassl:2.0.0:rc1:*:*:*:*:*:*
- cpe:2.3:a:yassl:cyassl:1.9.0:*:*:*:*:*:*:*
- cpe:2.3:a:yassl:cyassl:1.4.0:*:*:*:*:*:*:*
- cpe:2.3:a:yassl:cyassl:1.3.0:*:*:*:*:*:*:*
- cpe:2.3:a:yassl:cyassl:1.8.0:*:*:*:*:*:*:*
- cpe:2.3:a:yassl:cyassl:1.6.5:*:*:*:*:*:*:*
- cpe:2.3:a:yassl:cyassl:1.2.0:*:*:*:*:*:*:*
- cpe:2.3:a:yassl:cyassl:1.1.0:*:*:*:*:*:*:*
- cpe:2.3:a:yassl:cyassl:0.9.9:*:*:*:*:*:*:*
- cpe:2.3:a:yassl:cyassl:0.9.8:*:*:*:*:*:*:*
- cpe:2.3:a:yassl:cyassl:0.5.0:*:*:*:*:*:*:*
- cpe:2.3:a:yassl:cyassl:0.4.0:*:*:*:*:*:*:*
- cpe:2.3:a:yassl:cyassl:2.0.2:*:*:*:*:*:*:*
- cpe:2.3:a:yassl:cyassl:2.0.0:rc3:*:*:*:*:*:*
- cpe:2.3:a:yassl:cyassl:1.5.4:*:*:*:*:*:*:*
- cpe:2.3:a:yassl:cyassl:1.5.0:*:*:*:*:*:*:*
- cpe:2.3:a:yassl:cyassl:1.0.2:*:*:*:*:*:*:*
- cpe:2.3:a:yassl:cyassl:1.0.0:rc3:*:*:*:*:*:*
- cpe:2.3:a:yassl:cyassl:0.8.0:*:*:*:*:*:*:*
- cpe:2.3:a:yassl:cyassl:0.6.3:*:*:*:*:*:*:*
- cpe:2.3:a:yassl:cyassl:0.6.2:*:*:*:*:*:*:*
- cpe:2.3:a:yassl:cyassl:1.0.0:rc2:*:*:*:*:*:*
- cpe:2.3:a:yassl:cyassl:1.0.0:rc1:*:*:*:*:*:*
- cpe:2.3:a:yassl:cyassl:0.6.0:*:*:*:*:*:*:*
- cpe:2.3:a:yassl:cyassl:0.5.5:*:*:*:*:*:*:*
- cpe:2.3:a:yassl:cyassl:1.6.0:*:*:*:*:*:*:*
- cpe:2.3:a:yassl:cyassl:1.5.6:*:*:*:*:*:*:*
- cpe:2.3:a:yassl:cyassl:1.0.6:*:*:*:*:*:*:*
- cpe:2.3:a:yassl:cyassl:1.0.3:*:*:*:*:*:*:*
- cpe:2.3:a:yassl:cyassl:0.9.6:*:*:*:*:*:*:*
- cpe:2.3:a:yassl:cyassl:0.9.0:*:*:*:*:*:*:*
- cpe:2.3:a:yassl:cyassl:0.3.0:*:*:*:*:*:*:*
- cpe:2.3:a:yassl:cyassl:0.2.0:*:*:*:*:*:*:*
- cpe:2.3:a:yassl:cyassl:2.3.0:*:*:*:*:*:*:*
- cpe:2.3:a:yassl:cyassl:2.4.0:*:*:*:*:*:*:*
- cpe:2.3:a:yassl:cyassl:2.0.6:*:*:*:*:*:*:*
- cpe:2.3:a:yassl:cyassl:2.0.8:*:*:*:*:*:*:*
- cpe:2.3:a:yassl:cyassl:2.2.0:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2013-1623
0.32%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 67 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2013-1623
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
4.3
|
MEDIUM | AV:N/AC:M/Au:N/C:P/I:N/A:N |
8.6
|
2.9
|
NIST |
CWE ids for CVE-2013-1623
-
Assigned by: nvd@nist.gov (Primary)
References for CVE-2013-1623
-
http://www.yassl.com/yaSSL/Blog/Entries/2013/2/5_WolfSSL%2C_provider_of_CyaSSL_Embedded_SSL%2C_releases_first_embedded_TLS_and_DTLS_protocol_fix_for_Lucky_Thirteen_Attack.html
wolfSSL, provider of CyaSSL Embedded SSL, releases first embedded TLS and DTLS protocol fix for Lucky Thirteen Attack - wolfSSL
-
http://openwall.com/lists/oss-security/2013/02/05/24
oss-security - Re: CVE request: TLS CBC padding timing flaw in various SSL / TLS implementations
-
http://security.gentoo.org/glsa/glsa-201308-06.xml
MySQL: Multiple vulnerabilities (GLSA 201308-06) — Gentoo security
-
http://www.isg.rhul.ac.uk/tls/TLStiming.pdf
Jump to