2.6
CVSSv2

CVE-2013-0169

Published: 08/02/2013 Updated: 12/05/2023
CVSS v2 Base Score: 2.6 | Impact Score: 2.9 | Exploitability Score: 4.9
VMScore: 234
Vector: AV:N/AC:H/Au:N/C:P/I:N/A:N

Vulnerability Summary

The TLS protocol 1.1 and 1.2 and the DTLS protocol 1.0 and 1.2, as used in OpenSSL, OpenJDK, PolarSSL, and other products, do not properly consider timing side-channel attacks on a MAC check requirement during the processing of malformed CBC padding, which allows remote malicious users to conduct distinguishing attacks and plaintext-recovery attacks via statistical analysis of timing data for crafted packets, aka the "Lucky Thirteen" issue.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

openssl openssl

oracle openjdk 1.7.0

oracle openjdk 1.6.0

polarssl polarssl 0.14.2

polarssl polarssl 0.11.0

polarssl polarssl 1.0.0

polarssl polarssl 0.13.1

polarssl polarssl 1.1.3

polarssl polarssl 0.12.1

polarssl polarssl 0.99

polarssl polarssl 0.11.1

polarssl polarssl 1.1.4

polarssl polarssl 0.14.0

polarssl polarssl 1.1.1

polarssl polarssl 1.1.2

polarssl polarssl 0.14.3

polarssl polarssl 1.1.0

polarssl polarssl 0.10.1

polarssl polarssl 0.12.0

polarssl polarssl 0.10.0

Vendor Advisories

Multiple vulnerabilities have been found in PolarSSL The Common Vulnerabilities and Exposures project identifies the following issues: CVE-2013-0169 A timing side channel attack has been found in CBC padding allowing an attacker to recover pieces of plaintext via statistical analysis of crafted packages, known as the Lucky Thirteen is ...
Multiple vulnerabilities have been found in OpenSSL The Common Vulnerabilities and Exposures project identifies the following issues: CVE-2013-0166 OpenSSL does not properly perform signature verification for OCSP responses, which allows remote attackers to cause a denial of service via an invalid key CVE-2013-0169 A timing side ...
Several security issues were fixed in OpenSSL ...
Several security issues were fixed in OpenSSL ...
USN-1732-1 introduced a regression in OpenSSL ...
Several security issues were fixed in OpenJDK ...
Synopsis Critical: java-160-ibm security update Type/Severity Security Advisory: Critical Topic Updated java-160-ibm packages that fix several security issues are nowavailable for Red Hat Enterprise Linux 5 and 6 SupplementaryThe Red Hat Security Response Team has rated this update as having criticalse ...
Synopsis Important: java-170-openjdk security update Type/Severity Security Advisory: Important Topic Updated java-170-openjdk packages that fix several security issues arenow available for Red Hat Enterprise Linux 5 and 6The Red Hat Security Response Team has rated this update as havingimportant secur ...
Synopsis Moderate: openssl security update Type/Severity Security Advisory: Moderate Topic Updated openssl packages that fix multiple security issues are nowavailable for Red Hat Enterprise Linux 5 and 6The Red Hat Security Response Team has rated this update as having moderatesecurity impact Common Vulne ...
Synopsis Important: rhev-hypervisor6 security and bug fix update Type/Severity Security Advisory: Important Topic An updated rhev-hypervisor6 package that fixes several security issues andvarious bugs is now availableThe Red Hat Security Response Team has rated this update as havingimportant security impac ...
Synopsis Important: java-160-openjdk security update Type/Severity Security Advisory: Important Topic Updated java-160-openjdk packages that fix two security issues are nowavailable for Red Hat Enterprise Linux 5The Red Hat Security Response Team has rated this update as havingimportant security impact ...
Synopsis Critical: java-160-openjdk security update Type/Severity Security Advisory: Critical Topic Updated java-160-openjdk packages that fix two security issues are nowavailable for Red Hat Enterprise Linux 6The Red Hat Security Response Team has rated this update as having criticalsecurity impact C ...
Synopsis Critical: java-160-sun security update Type/Severity Security Advisory: Critical Topic Updated java-160-sun packages that fix three security issues are nowavailable for Red Hat Enterprise Linux 5 and 6 SupplementaryThe Red Hat Security Response Team has rated this update as having criticalsecu ...
Synopsis Critical: java-170-oracle security update Type/Severity Security Advisory: Critical Topic Updated java-170-oracle packages that fix several security issues are nowavailable for Red Hat Enterprise Linux 5 and 6 SupplementaryThe Red Hat Security Response Team has rated this update as having crit ...
Synopsis Low: Red Hat Network Satellite server IBM Java Runtime security update Type/Severity Security Advisory: Low Topic Updated java-160-ibm packages that fix several security issues are nowavailable for Red Hat Network Satellite Server 55The Red Hat Security Response Team has rated this update as ha ...
Synopsis Low: Red Hat Network Satellite server IBM Java Runtime security update Type/Severity Security Advisory: Low Topic Updated java-160-ibm packages that fix several security issues are nowavailable for Red Hat Network Satellite Server 54The Red Hat Security Response Team has rated this update as ha ...
Synopsis Moderate: OpenShift Container Platform 461 image security update Type/Severity Security Advisory: Moderate Topic An update is now available for Red Hat OpenShift Container Platform 46Red Hat Product Security has rated this update as having a security impact of Moderate A Common Vulnerability S ...
Debian Bug report logs - #699887 TLS timing attack in polarssl (Lucky 13) Package: polarssl; Maintainer for polarssl is Roland Stigge <stigge@antcomde>; Reported by: Thijs Kinkhorst <thijs@debianorg> Date: Wed, 6 Feb 2013 10:51:04 UTC Severity: serious Tags: security Fixed in versions polarssl/125-1, polarssl/1 ...
Debian Bug report logs - #699886 TLS timing attack in yaSSL (Lucky 13) Package: mysql-55; Maintainer for mysql-55 is Debian MySQL Maintainers <pkg-mysql-maint@listsaliothdebianorg>; Reported by: Thijs Kinkhorst <thijs@debianorg> Date: Wed, 6 Feb 2013 10:51:01 UTC Severity: serious Tags: patch, pending, securit ...
Debian Bug report logs - #699885 TLS timing attack in bouncycastle (Lucky 13) Package: bouncycastle; Maintainer for bouncycastle is Debian Java Maintainers <pkg-java-maintainers@listsaliothdebianorg>; Reported by: Thijs Kinkhorst <thijs@debianorg> Date: Wed, 6 Feb 2013 10:48:02 UTC Severity: serious Tags: securi ...
Debian Bug report logs - #699889 several issues in Security Advisory 5 Feb 2013 Package: openssl; Maintainer for openssl is Debian OpenSSL Team <pkg-openssl-devel@listsaliothdebianorg>; Source for openssl is src:openssl (PTS, buildd, popcon) Reported by: Thijs Kinkhorst <thijs@debianorg> Date: Wed, 6 Feb 2013 11 ...
Debian Bug report logs - #699888 TLS timing attack in nss (Lucky 13) Package: nss; Maintainer for nss is Maintainers of Mozilla-related packages <team+pkg-mozilla@trackerdebianorg>; Reported by: Thijs Kinkhorst <thijs@debianorg> Date: Wed, 6 Feb 2013 10:54:02 UTC Severity: serious Tags: security Fixed in version ...
It was discovered that OpenSSL leaked timing information when decrypting TLS/SSL and DTLS protocol encrypted records when CBC-mode cipher suites were used A remote attacker could possibly use this flaw to retrieve plain text from the encrypted packets by using a TLS/SSL or DTLS server as a padding oracle (CVE-2013-0169) A NULL pointer dereference ...
Multiple improper permission check issues were discovered in the JMX and Libraries components in OpenJDK An untrusted Java application or applet could use these flaws to bypass Java sandbox restrictions (CVE-2013-1486, CVE-2013-1484) An improper permission check issue was discovered in the Libraries component in OpenJDK An untrusted Java applica ...
An improper permission check issue was discovered in the JMX component in OpenJDK An untrusted Java application or applet could use this flaw to bypass Java sandbox restrictions (CVE-2013-1486) It was discovered that OpenJDK leaked timing information when decrypting TLS/SSL protocol encrypted records when CBC-mode cipher suites were used A remot ...
The TLS protocol 11 and 12 and the DTLS protocol 10 and 12, as used in OpenSSL, OpenJDK, PolarSSL, and other products, do not properly consider timing side-channel attacks on a MAC check requirement during the processing of malformed CBC padding, which allows remote attackers to conduct distinguishing attacks and plaintext-recovery attacks via ...

Github Repositories

A collection of security related Python and Bash shell scripts. Analyze hosts on generic security vulnerabilities. Wrapper around popular tools like nmap (portscanner), nikto (webscanner) and testssl.sh (SSL/TLS scanner)

security-scripts A collection of security related Python and Bash shell scripts, mainly revolving around testing hosts for security vulnerabilities For the shell scripts no fancy programming framework is required, all that is needed is a Bash shell Note that it is highly recommended to use analyze_hostspy as it is the most recent version No new features will be added to the

TLS implementation in pure python, focused on interoperability testing

tlslite-ng version 080-alpha44 (2023-06-09) Table of Contents Introduction License/Acknowledgements Installation Getting Started with the Command-Line Tools Getting Started with the Library Using tlslite-ng with httplib Using tlslite-ng with poplib or imaplib Using tlslite-ng with smtplib Using tlslite-ng with SocketServer Using tlslite-ng with asyncore History 1 Introd

tlslite-ng

tlslite-ng version 080-alpha43 (2022-05-11) Table of Contents Introduction License/Acknowledgements Installation Getting Started with the Command-Line Tools Getting Started with the Library Using tlslite-ng with httplib Using tlslite-ng with poplib or imaplib Using tlslite-ng with smtplib Using tlslite-ng with SocketServer Using tlslite-ng with asyncore History 1 Introd

TLS implementation in pure python, focused on interoperability testing

tlslite-ng version 080-beta1 (2023-08-24) Table of Contents Introduction License/Acknowledgements Installation Getting Started with the Command-Line Tools Getting Started with the Library Using tlslite-ng with httplib Using tlslite-ng with poplib or imaplib Using tlslite-ng with smtplib Using tlslite-ng with SocketServer Using tlslite-ng with asyncore History 1 Introduc

TLS implementation in pure python, focused on interoperability testing

tlslite-ng version 080-beta1 (2023-08-24) Table of Contents Introduction License/Acknowledgements Installation Getting Started with the Command-Line Tools Getting Started with the Library Using tlslite-ng with httplib Using tlslite-ng with poplib or imaplib Using tlslite-ng with smtplib Using tlslite-ng with SocketServer Using tlslite-ng with asyncore History 1 Introduc

security-scripts A collection of security related Python and Bash shell scripts, mainly revolving around testing hosts for security vulnerabilities For the shell scripts no fancy programming framework is required, all that is needed is a Bash shell Note that it is highly recommended to use analyze_hostspy as it is the most recent version No new features will be added to the

metls

tlslite-ng version 080-alpha21 (2018-12-10) Table of Contents Introduction License/Acknowledgements Installation Getting Started with the Command-Line Tools Getting Started with the Library Using tlslite-ng with httplib Using tlslite-ng with poplib or imaplib Using tlslite-ng with smtplib Using tlslite-ng with SocketServer Using tlslite-ng with asyncore SECURITY CONSIDE

tlslite-ng version 080-alpha43 (2022-05-11) Table of Contents Introduction License/Acknowledgements Installation Getting Started with the Command-Line Tools Getting Started with the Library Using tlslite-ng with httplib Using tlslite-ng with poplib or imaplib Using tlslite-ng with smtplib Using tlslite-ng with SocketServer Using tlslite-ng with asyncore History 1 Introd

https://github.com/tomato42/tlslite-ng.git

tlslite-ng version 080-beta1 (2023-08-24) Table of Contents Introduction License/Acknowledgements Installation Getting Started with the Command-Line Tools Getting Started with the Library Using tlslite-ng with httplib Using tlslite-ng with poplib or imaplib Using tlslite-ng with smtplib Using tlslite-ng with SocketServer Using tlslite-ng with asyncore History 1 Introduc

Security scripts

security-scripts A collection of security related Python and Bash shell scripts, mainly revolving around testing hosts for security vulnerabilities For the shell scripts no fancy programming framework is required, all that is needed is a Bash shell Note that it is highly recommended to use analyze_hostspy as it is the most recent version No new features will be added to the

SECURITY-SCRIPTS security-scripts A collection of security related Python and Bash shell scripts, mainly revolving around testing hosts for security vulnerabilities For the shell scripts no fancy programming framework is required, all that is needed is a Bash shell Note that it is highly recommended to use analyze_hostspy as it is the most recent version No new features wil

References

CWE-310http://www.openssl.org/news/secadv_20130204.txthttps://polarssl.org/tech-updates/releases/polarssl-1.2.5-releasedhttp://openwall.com/lists/oss-security/2013/02/05/24http://www.isg.rhul.ac.uk/tls/TLStiming.pdfhttp://www.matrixssl.org/news.htmlhttp://www.oracle.com/technetwork/topics/security/javacpufeb2013update-1905892.htmlhttp://www.ubuntu.com/usn/USN-1735-1http://lists.opensuse.org/opensuse-security-announce/2013-03/msg00000.htmlhttp://www.debian.org/security/2013/dsa-2621http://lists.opensuse.org/opensuse-security-announce/2013-02/msg00020.htmlhttp://rhn.redhat.com/errata/RHSA-2013-0587.htmlhttp://www.debian.org/security/2013/dsa-2622http://lists.opensuse.org/opensuse-security-announce/2013-03/msg00002.htmlhttp://www.us-cert.gov/cas/techalerts/TA13-051A.htmlhttp://rhn.redhat.com/errata/RHSA-2013-0783.htmlhttp://marc.info/?l=bugtraq&m=136396549913849&w=2http://marc.info/?l=bugtraq&m=136439120408139&w=2http://marc.info/?l=bugtraq&m=136733161405818&w=2http://rhn.redhat.com/errata/RHSA-2013-0782.htmlhttp://www-01.ibm.com/support/docview.wss?uid=swg21644047http://www.kb.cert.org/vuls/id/737740http://lists.apple.com/archives/security-announce/2013/Sep/msg00002.htmlhttp://support.apple.com/kb/HT5880http://secunia.com/advisories/55139http://secunia.com/advisories/55108http://secunia.com/advisories/55351http://secunia.com/advisories/55350http://www.securitytracker.com/id/1029190http://secunia.com/advisories/55322http://rhn.redhat.com/errata/RHSA-2013-1455.htmlhttp://rhn.redhat.com/errata/RHSA-2013-0833.htmlhttp://rhn.redhat.com/errata/RHSA-2013-1456.htmlhttp://lists.fedoraproject.org/pipermail/package-announce/2013-April/101366.htmlhttp://marc.info/?l=bugtraq&m=137545771702053&w=2http://lists.opensuse.org/opensuse-security-announce/2013-04/msg00020.htmlhttp://www.splunk.com/view/SP-CAAAHXGhttp://secunia.com/advisories/53623http://www.mandriva.com/security/advisories?name=MDVSA-2013:095https://wiki.mageia.org/en/Support/Advisories/MGASA-2013-0084http://blog.fuseyism.com/index.php/2013/02/20/security-icedtea-2-1-6-2-2-6-2-3-7-for-openjdk-7-released/http://lists.opensuse.org/opensuse-security-announce/2014-03/msg00001.htmlhttp://security.gentoo.org/glsa/glsa-201406-32.xmlhttp://lists.opensuse.org/opensuse-security-announce/2015-03/msg00027.htmlhttp://marc.info/?l=bugtraq&m=136432043316835&w=2http://www.securityfocus.com/bid/57778http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00011.htmlhttps://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A19608https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A19540https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A19424https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A19016https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A18841https://puppet.com/security/cve/cve-2013-0169https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c03883001https://lists.debian.org/debian-lts-announce/2018/09/msg00029.htmlhttps://cert-portal.siemens.com/productcert/pdf/ssa-556833.pdfhttps://nvd.nist.govhttps://www.debian.org/security/./dsa-2622https://usn.ubuntu.com/1732-3/https://www.cisa.gov/uscert/ics/advisories/icsa-22-349-21https://www.kb.cert.org/vuls/id/737740