The TLS implementation in Mozilla Network Security Services (NSS) does not properly consider timing side-channel attacks on a noncompliant MAC check operation during the processing of malformed CBC padding, which allows remote attackers to conduct distinguishing attacks and plaintext-recovery attacks via statistical analysis of timing data for crafted packets, a related issue to CVE-2013-0169.
The product behaves differently or sends different responses under different circumstances in a way that is observable to an unauthorized actor, which exposes security-relevant information about the state of the product, such as whether a particular operation was successful or not.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Network_security_services | Mozilla | * | 3.14.3 (excluding) |
Red Hat Enterprise Linux 5 | RedHat | nspr-0:4.9.5-1.el5_9 | * |
Red Hat Enterprise Linux 5 | RedHat | nss-0:3.14.3-6.el5_9 | * |
Red Hat Enterprise Linux 6 | RedHat | nspr-0:4.9.5-2.el6_4 | * |
Red Hat Enterprise Linux 6 | RedHat | nss-0:3.14.3-4.el6_4 | * |
Red Hat Enterprise Linux 6 | RedHat | nss-softokn-0:3.14.3-3.el6_4 | * |
Red Hat Enterprise Linux 6 | RedHat | nss-util-0:3.14.3-3.el6_4 | * |
RHEV 3.X Hypervisor and Agents for RHEL-6 | RedHat | rhev-hypervisor6-0:6.4-20130815.0.el6_4 | * |
Nss | Ubuntu | devel | * |
Nss | Ubuntu | hardy | * |
Nss | Ubuntu | lucid | * |
Nss | Ubuntu | oneiric | * |
Nss | Ubuntu | precise | * |
Nss | Ubuntu | quantal | * |
Nss | Ubuntu | upstream | * |