CVSS2
Attack Vector
NETWORK
Attack Complexity
HIGH
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
NONE
AV:N/AC:H/Au:N/C:P/I:P/A:N
EPSS
Percentile
77.3%
The TLS implementation in the Bouncy Castle Java library before 1.48 and C#
library before 1.8 does not properly consider timing side-channel attacks
on a noncompliant MAC check operation during the processing of malformed
CBC padding, which allows remote attackers to conduct distinguishing
attacks and plaintext-recovery attacks via statistical analysis of timing
data for crafted packets, a related issue to CVE-2013-0169.
Author | Note |
---|---|
mdeslaur | list of commits may be incomplete |
seth-arnold | I read all diffs in crypto/tls/ directory since Lucky 13 patches, the two listed here were the only ones that looked related to this problem, the other updates were mostly for style fixes. |
mdeslaur | no reverse depends in main in precise+ |