[Forgot Password]
Login  Register Subscribe

24128

 
 

131573

 
 

110507

 
 

909

 
 

86504

 
 

136

Paid content will be excluded from the download.


Download | Alert*
OVAL

ALAS-2014-320 ---- openssl

ID: oval:org.secpod.oval:def:1600138Date: (C)2016-01-05   (M)2018-05-06
Class: PATCHFamily: unix




The TLS protocol 1.1 and 1.2 and the DTLS protocol 1.0 and 1.2, as used in OpenSSL, OpenJDK, PolarSSL, and other products, do not properly consider timing side-channel attacks on a MAC check requirement during the processing of malformed CBC padding, which allows remote attackers to conduct distinguishing attacks and plaintext-recovery attacks via statistical analysis of timing data for crafted packets, aka the "Lucky Thirteen" issue. The TLS and DTLS implementations in OpenSSL 1.0.1 before 1.0.1g do not properly handle Heartbeat Extension packets, which allows remote attackers to obtain sensitive information from process memory via crafted packets that trigger a buffer over-read, as demonstrated by reading private keys, related to d1_both.c and t1_lib.c, aka the Heartbleed bug.

Platform:
Amazon Linux AMI
Product:
openssl
Reference:
ALAS-2014-320
CVE-2013-0169
CVE-2014-0160
CVE    2
CVE-2013-0169
CVE-2014-0160
CPE    47
cpe:/a:openssl:openssl:1.0.0j
cpe:/a:openssl:openssl:1.0.0i
cpe:/a:openssl:openssl:0.9.8x
cpe:/a:openssl:openssl:1.0.0f
...

© SecPod Technologies