Lucene search

K
mageiaGentoo FoundationMGASA-2013-0290
HistorySep 25, 2013 - 1:41 a.m.

Updated polarssl package fixes security vulnerabilities

2013-09-2501:41:53
Gentoo Foundation
advisories.mageia.org
12

4.3 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:N/I:N/A:P

0.04 Low

EPSS

Percentile

92.0%

The TLS protocol 1.1 and 1.2 and the DTLS protocol 1.0 and 1.2, as used in PolarSSL before 1.2.6, does not properly consider timing side-channel attacks on a MAC check requirement during the processing of malformed CBC padding, which allows remote attackers to conduct distinguishing attacks and plaintext-recovery attacks via statistical analysis of timing data for crafted packets, aka the “Lucky Thirteen” issue (CVE-2013-0169). Array index error in the SSL module in PolarSSL before 1.2.6 might allow remote attackers to cause a denial of service via vectors involving a crafted padding-length value during validation of CBC padding in a TLS session (CVE-2013-1621). A third party can set up a SSL/TLS handshake with a server and send a malformed Certificate handshake message that results in an infinite loop for that connection. With a Man-in-the-Middle attack on a client, a third party can trigger the same infinite loop on a client (CVE-2013-4623).

OSVersionArchitecturePackageVersionFilename
Mageia3noarchpolarssl< 1.2.8-1polarssl-1.2.8-1.mga3

4.3 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:N/I:N/A:P

0.04 Low

EPSS

Percentile

92.0%