The TLS and DTLS implementations in wolfSSL CyaSSL prior to 2.5.0 do not properly consider timing side-channel attacks on a noncompliant MAC check operation during the processing of malformed CBC padding, which allows remote malicious users to conduct distinguishing attacks and plaintext-recovery attacks via statistical analysis of timing data for crafted packets, a related issue to CVE-2013-0169.
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
yassl cyassl 2.0.0 |
||
yassl cyassl 1.6.0 |
||
yassl cyassl 0.3.0 |
||
yassl cyassl 0.8.0 |
||
yassl cyassl 1.2.0 |
||
yassl cyassl 1.0.3 |
||
yassl cyassl 0.9.0 |
||
yassl cyassl 0.9.6 |
||
yassl cyassl 2.3.0 |
||
yassl cyassl 2.4.0 |
||
yassl cyassl 1.5.6 |
||
yassl cyassl 1.8.0 |
||
yassl cyassl 0.6.3 |
||
yassl cyassl 0.6.2 |
||
yassl cyassl 1.0.6 |
||
yassl cyassl 1.5.0 |
||
yassl cyassl 1.5.4 |
||
yassl cyassl 1.0.0 |
||
yassl cyassl 1.0.2 |
||
yassl cyassl |
||
yassl cyassl 1.9.0 |
||
yassl cyassl 0.5.0 |
||
yassl cyassl 0.4.0 |
||
yassl cyassl 2.0.6 |
||
yassl cyassl 1.1.0 |
||
yassl cyassl 0.9.8 |
||
yassl cyassl 0.9.9 |
||
yassl cyassl 2.0.8 |
||
yassl cyassl 2.2.0 |
||
yassl cyassl 2.0.2 |
||
yassl cyassl 1.6.5 |
||
yassl cyassl 0.5.5 |
||
yassl cyassl 0.6.0 |
||
yassl cyassl 0.2.0 |
||
yassl cyassl 1.3.0 |
||
yassl cyassl 1.4.0 |