4.3
CVE-2013-1620
- EPSS 0.81%
- Published 08.02.2013 19:55:01
- Last modified 11.04.2025 00:51:21
- Source cve@mitre.org
- Teams watchlist Login
- Open Login
The TLS implementation in Mozilla Network Security Services (NSS) does not properly consider timing side-channel attacks on a noncompliant MAC check operation during the processing of malformed CBC padding, which allows remote attackers to conduct distinguishing attacks and plaintext-recovery attacks via statistical analysis of timing data for crafted packets, a related issue to CVE-2013-0169.
Data is provided by the National Vulnerability Database (NVD)
Mozilla ≫ Network Security Services Version < 3.14.3
Canonical ≫ Ubuntu Linux Version10.04 SwEdition-
Canonical ≫ Ubuntu Linux Version11.10
Canonical ≫ Ubuntu Linux Version12.04 SwEdition-
Canonical ≫ Ubuntu Linux Version12.10
Oracle ≫ Enterprise Manager Ops Center Version11.1
Oracle ≫ Enterprise Manager Ops Center Version12.1
Oracle ≫ Enterprise Manager Ops Center Version12.2
Oracle ≫ Glassfish Communications Server Version2.0
Oracle ≫ Glassfish Server Version2.1.1
Oracle ≫ Iplanet Web Proxy Server Version4.0
Oracle ≫ Iplanet Web Server Version6.1
Oracle ≫ Iplanet Web Server Version7.0
Oracle ≫ Traffic Director Version11.1.1.6.0
Oracle ≫ Traffic Director Version11.1.1.7.0
Redhat ≫ Enterprise Linux Desktop Version5.0
Redhat ≫ Enterprise Linux Desktop Version6.0
Redhat ≫ Enterprise Linux Eus Version5.9
Redhat ≫ Enterprise Linux Server Version5.0
Redhat ≫ Enterprise Linux Server Version6.0
Redhat ≫ Enterprise Linux Server Aus Version5.9
Redhat ≫ Enterprise Linux Workstation Version5.0
Redhat ≫ Enterprise Linux Workstation Version6.0
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
Type | Source | Score | Percentile |
---|---|---|---|
EPSS | FIRST.org | 0.81% | 0.735 |
Source | Base Score | Exploit Score | Impact Score | Vector string |
---|---|---|---|---|
nvd@nist.gov | 4.3 | 8.6 | 2.9 |
AV:N/AC:M/Au:N/C:P/I:N/A:N
|
CWE-203 Observable Discrepancy
The product behaves differently or sends different responses under different circumstances in a way that is observable to an unauthorized actor, which exposes security-relevant information about the state of the product, such as whether a particular operation was successful or not.