Skip to content

The TLS implementation in Mozilla Network Security...

Moderate severity Unreviewed Published May 14, 2022 to the GitHub Advisory Database • Updated Jan 29, 2023

Package

No package listedSuggest a package

Affected versions

Unknown

Patched versions

Unknown

Description

The TLS implementation in Mozilla Network Security Services (NSS) does not properly consider timing side-channel attacks on a noncompliant MAC check operation during the processing of malformed CBC padding, which allows remote attackers to conduct distinguishing attacks and plaintext-recovery attacks via statistical analysis of timing data for crafted packets, a related issue to CVE-2013-0169.

References

Published by the National Vulnerability Database Feb 8, 2013
Published to the GitHub Advisory Database May 14, 2022
Last updated Jan 29, 2023

Severity

Moderate

EPSS score

0.439%
(75th percentile)

Weaknesses

CVE ID

CVE-2013-1620

GHSA ID

GHSA-4pp6-m86c-j4gj

Source code

No known source code

Dependabot alerts are not supported on this advisory because it does not have a package from a supported ecosystem with an affected and fixed version.

Learn more about GitHub language support

Loading Checking history
See something to contribute? Suggest improvements for this vulnerability.