[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

248268

 
 

909

 
 

195051

 
 

282

Paid content will be excluded from the download.


Download | Alert*
OVAL

ALAS-2014-320 ---- openssl

ID: oval:org.secpod.oval:def:1600138Date: (C)2016-01-05   (M)2023-12-07
Class: PATCHFamily: unix




The TLS protocol 1.1 and 1.2 and the DTLS protocol 1.0 and 1.2, as used in OpenSSL, OpenJDK, PolarSSL, and other products, do not properly consider timing side-channel attacks on a MAC check requirement during the processing of malformed CBC padding, which allows remote attackers to conduct distinguishing attacks and plaintext-recovery attacks via statistical analysis of timing data for crafted packets, aka the "Lucky Thirteen" issue. The TLS and DTLS implementations in OpenSSL 1.0.1 before 1.0.1g do not properly handle Heartbeat Extension packets, which allows remote attackers to obtain sensitive information from process memory via crafted packets that trigger a buffer over-read, as demonstrated by reading private keys, related to d1_both.c and t1_lib.c, aka the Heartbleed bug.

Platform:
Amazon Linux AMI
Product:
openssl
Reference:
ALAS-2014-320
CVE-2013-0169
CVE-2014-0160
CVE    2
CVE-2013-0169
CVE-2014-0160
CPE    47
cpe:/a:openssl:openssl:1.0.1:beta1
cpe:/o:amazon:linux
cpe:/a:openssl:openssl:1.0.0g
cpe:/a:openssl:openssl:1.0.0j
...

© SecPod Technologies