2.6

CVE-2013-0169

The TLS protocol 1.1 and 1.2 and the DTLS protocol 1.0 and 1.2, as used in OpenSSL, OpenJDK, PolarSSL, and other products, do not properly consider timing side-channel attacks on a MAC check requirement during the processing of malformed CBC padding, which allows remote attackers to conduct distinguishing attacks and plaintext-recovery attacks via statistical analysis of timing data for crafted packets, aka the "Lucky Thirteen" issue.

Data is provided by the National Vulnerability Database (NVD)
OpenSSLOpenSSL Version >= 0.9.8 <= 0.9.8x
OpenSSLOpenSSL Version >= 1.0.0 <= 1.0.0j
OpenSSLOpenSSL Version >= 1.0.1 <= 1.0.1d
OracleOpenjdk Version1.6.0 Update-
OracleOpenjdk Version1.6.0 Updateupdate1
OracleOpenjdk Version1.6.0 Updateupdate10
OracleOpenjdk Version1.6.0 Updateupdate11
OracleOpenjdk Version1.6.0 Updateupdate12
OracleOpenjdk Version1.6.0 Updateupdate13
OracleOpenjdk Version1.6.0 Updateupdate14
OracleOpenjdk Version1.6.0 Updateupdate15
OracleOpenjdk Version1.6.0 Updateupdate16
OracleOpenjdk Version1.6.0 Updateupdate17
OracleOpenjdk Version1.6.0 Updateupdate18
OracleOpenjdk Version1.6.0 Updateupdate19
OracleOpenjdk Version1.6.0 Updateupdate2
OracleOpenjdk Version1.6.0 Updateupdate20
OracleOpenjdk Version1.6.0 Updateupdate21
OracleOpenjdk Version1.6.0 Updateupdate22
OracleOpenjdk Version1.6.0 Updateupdate23
OracleOpenjdk Version1.6.0 Updateupdate24
OracleOpenjdk Version1.6.0 Updateupdate25
OracleOpenjdk Version1.6.0 Updateupdate26
OracleOpenjdk Version1.6.0 Updateupdate27
OracleOpenjdk Version1.6.0 Updateupdate29
OracleOpenjdk Version1.6.0 Updateupdate3
OracleOpenjdk Version1.6.0 Updateupdate30
OracleOpenjdk Version1.6.0 Updateupdate31
OracleOpenjdk Version1.6.0 Updateupdate32
OracleOpenjdk Version1.6.0 Updateupdate33
OracleOpenjdk Version1.6.0 Updateupdate34
OracleOpenjdk Version1.6.0 Updateupdate35
OracleOpenjdk Version1.6.0 Updateupdate37
OracleOpenjdk Version1.6.0 Updateupdate38
OracleOpenjdk Version1.6.0 Updateupdate4
OracleOpenjdk Version1.6.0 Updateupdate5
OracleOpenjdk Version1.6.0 Updateupdate6
OracleOpenjdk Version1.6.0 Updateupdate7
OracleOpenjdk Version1.7.0 Update-
OracleOpenjdk Version1.7.0 Updateupdate1
OracleOpenjdk Version1.7.0 Updateupdate10
OracleOpenjdk Version1.7.0 Updateupdate11
OracleOpenjdk Version1.7.0 Updateupdate13
OracleOpenjdk Version1.7.0 Updateupdate2
OracleOpenjdk Version1.7.0 Updateupdate3
OracleOpenjdk Version1.7.0 Updateupdate4
OracleOpenjdk Version1.7.0 Updateupdate5
OracleOpenjdk Version1.7.0 Updateupdate6
OracleOpenjdk Version1.7.0 Updateupdate7
OracleOpenjdk Version1.7.0 Updateupdate9
PolarsslPolarssl Version0.10.0
PolarsslPolarssl Version0.10.1
PolarsslPolarssl Version0.11.0
PolarsslPolarssl Version0.11.1
PolarsslPolarssl Version0.12.0
PolarsslPolarssl Version0.12.1
PolarsslPolarssl Version0.13.1
PolarsslPolarssl Version0.14.0
PolarsslPolarssl Version0.14.2
PolarsslPolarssl Version0.14.3
PolarsslPolarssl Version0.99 Updatepre1
PolarsslPolarssl Version0.99 Updatepre3
PolarsslPolarssl Version0.99 Updatepre4
PolarsslPolarssl Version0.99 Updatepre5
PolarsslPolarssl Version1.0.0
PolarsslPolarssl Version1.1.0
PolarsslPolarssl Version1.1.0 Updaterc0
PolarsslPolarssl Version1.1.0 Updaterc1
PolarsslPolarssl Version1.1.1
PolarsslPolarssl Version1.1.2
PolarsslPolarssl Version1.1.3
PolarsslPolarssl Version1.1.4
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Type Source Score Percentile
EPSS FIRST.org 1.08% 0.771
CVSS Metriken
Source Base Score Exploit Score Impact Score Vector string
nvd@nist.gov 2.6 4.9 2.9
AV:N/AC:H/Au:N/C:P/I:N/A:N
http://www.kb.cert.org/vuls/id/737740
Third Party Advisory
US Government Resource
http://www.securitytracker.com/id/1029190
Third Party Advisory
VDB Entry
http://www.securityfocus.com/bid/57778
Third Party Advisory
VDB Entry
http://www.us-cert.gov/cas/techalerts/TA13-051A.html
Third Party Advisory
US Government Resource