Open mend-bolt-for-github[bot] opened 1 year ago
:heavy_check_mark: This issue was automatically closed by Mend because the vulnerable library in the specific branch(es) was either marked as ignored or it is no longer part of the Mend inventory.
:information_source: This issue was automatically re-opened by Mend because the vulnerable library in the specific branch(es) has been detected in the Mend inventory.
CVE-2013-0169 - Low Severity Vulnerability
Vulnerable Library - opensslOpenSSL_1_0_1g
TLS/SSL and crypto library
Library home page: https://github.com/openssl/openssl.git
Found in HEAD commit: 62135a1cde071188fb200acd8963ea17ba74de8a
Found in base branch: master
Vulnerable Source Files (1)
/ssl/d1_pkt.c
Vulnerability Details
The TLS protocol 1.1 and 1.2 and the DTLS protocol 1.0 and 1.2, as used in OpenSSL, OpenJDK, PolarSSL, and other products, do not properly consider timing side-channel attacks on a MAC check requirement during the processing of malformed CBC padding, which allows remote attackers to conduct distinguishing attacks and plaintext-recovery attacks via statistical analysis of timing data for crafted packets, aka the "Lucky Thirteen" issue.
Publish Date: 2013-02-08
URL: CVE-2013-0169
CVSS 3 Score Details (3.7)
Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: High - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: Low - Integrity Impact: None - Availability Impact: None
For more information on CVSS3 Scores, click here.Suggested Fix
Type: Upgrade version
Origin: https://nvd.nist.gov/vuln/detail/CVE-2013-0169
Release Date: 2013-02-08
Fix Resolution: java-1.6.0-openjdk - 1.6.0.0-1.56.1.11.8,1.6.0.0-1.35.1.11.8,1.6.0.0-1.35.1.11.8,1.6.0.0-1.35.1.11.8,1.6.0.0-1.56.1.11.8,1.6.0.0-1.56.1.11.8;java-1.7.0-openjdk-src - 1.7.0.9-2.3.7.1,1.7.0.9-2.3.7.1;java-1.6.0-openjdk-devel - 1.6.0.0-1.35.1.11.8,1.6.0.0-1.56.1.11.8,1.6.0.0-1.56.1.11.8,1.6.0.0-1.35.1.11.8;java-1.7.0-openjdk - 1.7.0.9-2.3.7.1,1.7.0.9-2.3.7.1,1.7.0.9-2.3.7.1;java-1.6.0-openjdk-src - 1.6.0.0-1.35.1.11.8,1.6.0.0-1.35.1.11.8,1.6.0.0-1.56.1.11.8,1.6.0.0-1.56.1.11.8;openssl-perl - 0.9.8e-26,0.9.8e-26;openssl - 0.9.8e-26,0.9.8e-26,0.9.8e-26,0.9.8e-26,0.9.8e-26;java-1.6.0-openjdk-javadoc - 1.6.0.0-1.35.1.11.8,1.6.0.0-1.35.1.11.8,1.6.0.0-1.56.1.11.8,1.6.0.0-1.56.1.11.8;openssl-devel - 0.9.8e-26,0.9.8e-26;java-1.7.0-openjdk-demo - 1.7.0.9-2.3.7.1,1.7.0.9-2.3.7.1;java-1.6.0-openjdk-demo - 1.6.0.0-1.56.1.11.8,1.6.0.0-1.56.1.11.8,1.6.0.0-1.35.1.11.8,1.6.0.0-1.35.1.11.8;java-1.7.0-openjdk-debuginfo - 1.7.0.9-2.3.7.1,1.7.0.9-2.3.7.1;openssl-debuginfo - 0.9.8e-26,0.9.8e-26,0.9.8e-26,0.9.8e-26,0.9.8e-26,0.9.8e-26,0.9.8e-26,0.9.8e-26;java-1.7.0-openjdk-javadoc - 1.7.0.9-2.3.7.1,1.7.0.9-2.3.7.1;java-1.6.0-openjdk-debuginfo - 1.6.0.0-1.56.1.11.8,1.6.0.0-1.56.1.11.8,1.6.0.0-1.35.1.11.8,1.6.0.0-1.35.1.11.8;java-1.7.0-openjdk-devel - 1.7.0.9-2.3.7.1,1.7.0.9-2.3.7.1
Step up your Open Source Security Game with Mend here