Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2013-0169

EPSS 0.84% · P75
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2013-0169

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Description
The TLS protocol 1.1 and 1.2 and the DTLS protocol 1.0 and 1.2, as used in OpenSSL, OpenJDK, PolarSSL, and other products, do not properly consider timing side-channel attacks on a MAC check requirement during the processing of malformed CBC padding, which allows remote attackers to conduct distinguishing attacks and plaintext-recovery attacks via statistical analysis of timing data for crafted packets, aka the "Lucky Thirteen" issue.
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Title
多个TLS/DTLS实现加密问题漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
OpenSSL是OpenSSL团队开发的一个开源的能够实现安全套接层(SSL v2/v3)和安全传输层(TLS v1)协议的通用加密库,它支持多种加密算法,包括对称密码、哈希算法、安全散列算法等。 OpenSSL,OpenJDK,PolarSSL和其它产品中所使用的TLS协议1.1以及1.2,DTLS协议1.0以及1.2中存在漏洞,该漏洞源于程序在处理畸形的CBC填充期间没有正确地研究针对固执的MAC地址检查操作所进行的计时边信道攻击。通过对特制报文的计时数据的统计分析,远程攻击者可利用该漏洞实施区分攻击
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
-n/a n/a -

II. Public POCs for CVE-2013-0169

#POC DescriptionSource LinkShenlong Link
1Exploit for cve-2013-0169https://github.com/wearohat/lucky13POC Details
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2013-0169

登录查看更多情报信息。

Same Patch Batch · n/a · 2013-02-08 · 21 CVEs total

CVE-2013-1620Mozilla Network Security Services TLS实现加密问题漏洞
CVE-2013-1465CubeCart ‘shipping’参数PHP对象注入漏洞
CVE-2013-0263Rack 远程任意代码执行漏洞
CVE-2013-0262Rack 路径遍历漏洞
CVE-2013-0242GNU C glibc ‘extend_buffers()’ 正则表达式处理拒绝服务漏洞
CVE-2013-0189Squid 缓冲区错误漏洞
CVE-2013-0170Red Hat libvirt 资源管理错误漏洞
CVE-2013-1624Bouncy Castle 加密问题漏洞
CVE-2013-1623wolfSSL CyaSSL TLS/DTLS实现加密问题漏洞
CVE-2013-1621PolarSSL 数组索引错误漏洞
CVE-2012-4700IntegraXor ActiveX Control 缓冲区溢出漏洞
CVE-2013-1619GnuTLS TLS实现加密问题漏洞
CVE-2013-1618Opera Web Browser TLS 加密问题漏洞
CVE-2013-0166OpenSSL 加密问题漏洞
CVE-2012-2686OpenSSL 加密问题漏洞
CVE-2013-1639Opera 跨站请求伪造漏洞
CVE-2013-1638Opera 代码注入漏洞
CVE-2013-1637Opera 代码注入漏洞
CVE-2013-0634Adobe Flash Player 缓冲区溢出漏洞
CVE-2013-0633Adobe Flash Player 缓冲区溢出漏洞

IV. Related Vulnerabilities

V. Comments for CVE-2013-0169

No comments yet


Leave a comment