CVE-2013-1619
Published: 08 February 2013
The TLS implementation in GnuTLS before 2.12.23, 3.0.x before 3.0.28, and 3.1.x before 3.1.7 does not properly consider timing side-channel attacks on a noncompliant MAC check operation during the processing of malformed CBC padding, which allows remote attackers to conduct distinguishing attacks and plaintext-recovery attacks via statistical analysis of timing data for crafted packets, a related issue to CVE-2013-0169.
Priority
Status
Package | Release | Status |
---|---|---|
gnutls13 Launchpad, Ubuntu, Debian |
Upstream |
Needs triage
|
Ubuntu 16.04 LTS (Xenial Xerus) |
Does not exist
|
|
Ubuntu 14.04 ESM (Trusty Tahr) |
Does not exist
|
|
gnutls26 Launchpad, Ubuntu, Debian |
Upstream |
Released
(2.12.20-4)
|
Ubuntu 16.04 LTS (Xenial Xerus) |
Does not exist
|
|
Ubuntu 14.04 ESM (Trusty Tahr) |
Not vulnerable
(2.12.23-1ubuntu1)
|
|
Patches: Upstream: https://gitorious.org/gnutls/gnutls/commit/458c67cf98740e7b12404f6c30e0d5317d56fd30 Upstream: https://gitorious.org/gnutls/gnutls/commit/93b7fcfa3297a9123630704668b2946f602b910e Upstream: https://gitorious.org/gnutls/gnutls/commit/7b65049a81ea02a92fef934318a680afd55e98d2 (backporting) |
||
gnutls28 Launchpad, Ubuntu, Debian |
Upstream |
Released
(3.0.22-3)
|
Ubuntu 16.04 LTS (Xenial Xerus) |
Not vulnerable
(3.2.11-2ubuntu1)
|
|
Ubuntu 14.04 ESM (Trusty Tahr) |
Does not exist
(trusty was not-affected [3.2.11-2ubuntu1])
|
|
Patches: Upstream: https://gitorious.org/gnutls/gnutls/commit/8dc2822966f64dd9cf7dde9c7aacd80d49d3ffe5 |
Notes
Author | Note |
---|---|
jdstrand | LP: #1166634 is reported as a regression |
References
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1619
- http://www.isg.rhul.ac.uk/tls/TLStiming.pdf
- http://openwall.com/lists/oss-security/2013/02/05/24
- https://usn.ubuntu.com/usn/usn-1752-1
- http://nmav.gnutls.org/2013/02/time-is-money-for-cbc-ciphersuites.html
- NVD
- Launchpad
- Debian