[Forgot Password]
Login  Register Subscribe

24003

 
 

131425

 
 

103942

 
 

909

 
 

84057

 
 

133

Paid content will be excluded from the download.


Download | Alert*
OVAL

ALAS-2014-320 ---- openssl

ID: oval:org.secpod.oval:def:1600138Date: (C)2016-01-05   (M)2018-02-19
Class: PATCHFamily: unix




The TLS protocol 1.1 and 1.2 and the DTLS protocol 1.0 and 1.2, as used in OpenSSL, OpenJDK, PolarSSL, and other products, do not properly consider timing side-channel attacks on a MAC check requirement during the processing of malformed CBC padding, which allows remote attackers to conduct distinguishing attacks and plaintext-recovery attacks via statistical analysis of timing data for crafted packets, aka the "Lucky Thirteen" issue. The TLS and DTLS implementations in OpenSSL 1.0.1 before 1.0.1g do not properly handle Heartbeat Extension packets, which allows remote attackers to obtain sensitive information from process memory via crafted packets that trigger a buffer over-read, as demonstrated by reading private keys, related to d1_both.c and t1_lib.c, aka the Heartbleed bug.

Platform:
Amazon Linux AMI
Product:
openssl
Reference:
ALAS-2014-320
CVE-2013-0169
CVE-2014-0160
CVE    2
CVE-2014-0160
CVE-2013-0169
CPE    72
cpe:/o:amazon:linux
cpe:/a:openssl:openssl:1.0.1a
cpe:/a:openssl:openssl:1.0.1c
cpe:/a:openssl:openssl:1.0.1b
...

© 2013 SecPod Technologies