Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2013-1624

EPSS 0.39% · P60
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2013-1624

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Description
The TLS implementation in the Bouncy Castle Java library before 1.48 and C# library before 1.8 does not properly consider timing side-channel attacks on a noncompliant MAC check operation during the processing of malformed CBC padding, which allows remote attackers to conduct distinguishing attacks and plaintext-recovery attacks via statistical analysis of timing data for crafted packets, a related issue to CVE-2013-0169.
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Title
Bouncy Castle 加密问题漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Bouncy Castle是Bouncy Castle组织的密码学中使用的API集合。它包括适用于Java和C#编程语言的API 。 Bouncy Castle Java库1.48之前版本以及C#库1.8之前版本中的TLS实现中存在加密问题漏洞,该漏洞源于程序在处理畸形的CBC填充期间没有正确地研究针对固执的MAC地址检查操作所进行的计时边信道攻击。通过对特制报文的计时数据的统计分析,远程攻击者可利用该漏洞实施区分攻击以及明文恢复攻击。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
-n/a n/a -

II. Public POCs for CVE-2013-1624

#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2013-1624

Please Login to view more intelligence information

Same Patch Batch · n/a · 2013-02-08 · 21 CVEs total

CVE-2013-1619GnuTLS TLS实现加密问题漏洞
CVE-2013-1465CubeCart ‘shipping’参数PHP对象注入漏洞
CVE-2013-0263Rack 远程任意代码执行漏洞
CVE-2013-0262Rack 路径遍历漏洞
CVE-2013-0242GNU C glibc ‘extend_buffers()’ 正则表达式处理拒绝服务漏洞
CVE-2013-0189Squid 缓冲区错误漏洞
CVE-2013-0170Red Hat libvirt 资源管理错误漏洞
CVE-2013-1623wolfSSL CyaSSL TLS/DTLS实现加密问题漏洞
CVE-2013-1621PolarSSL 数组索引错误漏洞
CVE-2013-1620Mozilla Network Security Services TLS实现加密问题漏洞
CVE-2012-4700IntegraXor ActiveX Control 缓冲区溢出漏洞
CVE-2013-1618Opera Web Browser TLS 加密问题漏洞
CVE-2013-0169多个TLS/DTLS实现加密问题漏洞
CVE-2013-0166OpenSSL 加密问题漏洞
CVE-2012-2686OpenSSL 加密问题漏洞
CVE-2013-1639Opera 跨站请求伪造漏洞
CVE-2013-1638Opera 代码注入漏洞
CVE-2013-1637Opera 代码注入漏洞
CVE-2013-0634Adobe Flash Player 缓冲区溢出漏洞
CVE-2013-0633Adobe Flash Player 缓冲区溢出漏洞

IV. Related Vulnerabilities

V. Comments for CVE-2013-1624

No comments yet


Leave a comment