MGASA-2013-0290

Source
https://advisories.mageia.org/MGASA-2013-0290.html
Import Source
https://advisories.mageia.org/MGASA-2013-0290.json
JSON Data
https://api.osv.dev/v1/vulns/MGASA-2013-0290
Related
Published
2013-09-24T21:41:53Z
Modified
2013-09-24T21:41:50Z
Summary
Updated polarssl package fixes security vulnerabilities
Details

The TLS protocol 1.1 and 1.2 and the DTLS protocol 1.0 and 1.2, as used in PolarSSL before 1.2.6, does not properly consider timing side-channel attacks on a MAC check requirement during the processing of malformed CBC padding, which allows remote attackers to conduct distinguishing attacks and plaintext-recovery attacks via statistical analysis of timing data for crafted packets, aka the "Lucky Thirteen" issue (CVE-2013-0169).

Array index error in the SSL module in PolarSSL before 1.2.6 might allow remote attackers to cause a denial of service via vectors involving a crafted padding-length value during validation of CBC padding in a TLS session (CVE-2013-1621).

A third party can set up a SSL/TLS handshake with a server and send a malformed Certificate handshake message that results in an infinite loop for that connection. With a Man-in-the-Middle attack on a client, a third party can trigger the same infinite loop on a client (CVE-2013-4623).

References
Credits

Affected packages

Mageia:3 / polarssl

Package

Name
polarssl
Purl
pkg:rpm/mageia/polarssl?distro=mageia-3

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.2.8-1.mga3

Ecosystem specific

{
    "section": "core"
}