cve/2013/CVE-2013-1624.md

20 lines
990 B
Markdown
Raw Normal View History

2024-05-26 14:27:05 +02:00
### [CVE-2013-1624](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1624)
![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen)
### Description
The TLS implementation in the Bouncy Castle Java library before 1.48 and C# library before 1.8 does not properly consider timing side-channel attacks on a noncompliant MAC check operation during the processing of malformed CBC padding, which allows remote attackers to conduct distinguishing attacks and plaintext-recovery attacks via statistical analysis of timing data for crafted packets, a related issue to CVE-2013-0169.
### POC
#### Reference
- http://www.isg.rhul.ac.uk/tls/TLStiming.pdf
#### Github
- https://github.com/ARPSyndicate/cvemon
- https://github.com/IkerSaint/VULNAPP-vulnerable-app
- https://github.com/pctF/vulnerable-app