~ubuntu-security/ubuntu-cve-tracker/master

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
PublicDateAtUSN: 2013-02-08
Candidate: CVE-2013-1620
PublicDate: 2013-02-08
References:
 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1620
 http://www.isg.rhul.ac.uk/tls/TLStiming.pdf
 http://openwall.com/lists/oss-security/2013/02/05/24
 https://developer.mozilla.org/en-US/docs/NSS/NSS_3.14.3_release_notes
 https://bugzilla.mozilla.org/show_bug.cgi?id=822365
 http://www.ubuntu.com/usn/usn-1763-1
Description:
 The TLS implementation in Mozilla Network Security Services (NSS) does not
 properly consider timing side-channel attacks on a noncompliant MAC check
 operation during the processing of malformed CBC padding, which allows
 remote attackers to conduct distinguishing attacks and plaintext-recovery
 attacks via statistical analysis of timing data for crafted packets, a
 related issue to CVE-2013-0169.
Ubuntu-Description:
Notes:
Bugs:
 http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=699888
Priority: medium
Discovered-by:
Assigned-to: jdstrand

Patches_nss:
upstream_nss: released (3.14.3)
hardy_nss: ignored (reached end-of-life)
lucid_nss: released (3.14.3-0ubuntu0.10.04.1)
oneiric_nss: released (3.14.3-0ubuntu0.11.10.1)
precise_nss: released (3.14.3-0ubuntu0.12.04.1)
quantal_nss: released (3.14.3-0ubuntu0.12.10.1)
devel_nss: released (3.14.3-0ubuntu1)