[Forgot Password]
Login  Register Subscribe

23631

 
 

115083

 
 

97147

 
 

909

 
 

78730

 
 

109

Paid content will be excluded from the download.


Download | Alert*
OVAL

ALAS-2014-320 ---- openssl

ID: oval:org.secpod.oval:def:1600138Date: (C)2016-01-05   (M)2017-09-22
Class: PATCHFamily: unix




The TLS protocol 1.1 and 1.2 and the DTLS protocol 1.0 and 1.2, as used in OpenSSL, OpenJDK, PolarSSL, and other products, do not properly consider timing side-channel attacks on a MAC check requirement during the processing of malformed CBC padding, which allows remote attackers to conduct distinguishing attacks and plaintext-recovery attacks via statistical analysis of timing data for crafted packets, aka the "Lucky Thirteen" issue. The TLS and DTLS implementations in OpenSSL 1.0.1 before 1.0.1g do not properly handle Heartbeat Extension packets, which allows remote attackers to obtain sensitive information from process memory via crafted packets that trigger a buffer over-read, as demonstrated by reading private keys, related to d1_both.c and t1_lib.c, aka the Heartbleed bug.

Platform:
Amazon Linux AMI
Product:
openssl
Reference:
ALAS-2014-320
CVE-2013-0169
CVE-2014-0160
CVE    2
CVE-2014-0160
CVE-2013-0169
CPE    72
cpe:/a:oracle:openjdk:1.7.0
cpe:/a:polarssl:polarssl:0.99:pre5
cpe:/a:polarssl:polarssl:0.99:pre4
cpe:/a:polarssl:polarssl:0.99:pre3
...

© 2013 SecPod Technologies