The TLS and DTLS implementations in wolfSSL CyaSSL before 2.5.0 do not properly consider timing side-channel attacks on a noncompliant MAC check operation during the processing of malformed CBC padding, which allows remote attackers to conduct distinguishing attacks and plaintext-recovery attacks via statistical analysis of timing data for crafted packets, a related issue to CVE-2013-0169.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Cyassl | Yassl | 2.0.6 | 2.0.6 |
Cyassl | Yassl | 2.0.2 | 2.0.2 |
Cyassl | Yassl | 1.1.0 | 1.1.0 |
Cyassl | Yassl | 1.6.0 | 1.6.0 |
Cyassl | Yassl | 2.3.0 | 2.3.0 |
Cyassl | Yassl | 1.0.0 | 1.0.0 |
Cyassl | Yassl | 1.5.6 | 1.5.6 |
Cyassl | Yassl | 1.2.0 | 1.2.0 |
Cyassl | Yassl | 0.5.5 | 0.5.5 |
Cyassl | Yassl | 0.4.0 | 0.4.0 |
Cyassl | Yassl | 0.5.0 | 0.5.0 |
Cyassl | Yassl | 0.8.0 | 0.8.0 |
Cyassl | Yassl | 0.9.9 | 0.9.9 |
Cyassl | Yassl | 2.0.0 | 2.0.0 |
Cyassl | Yassl | 1.0.0 | 1.0.0 |
Cyassl | Yassl | 1.8.0 | 1.8.0 |
Cyassl | Yassl | 0.3.0 | 0.3.0 |
Cyassl | Yassl | 1.0.0 | 1.0.0 |
Cyassl | Yassl | 2.0.8 | 2.0.8 |
Cyassl | Yassl | 1.0.3 | 1.0.3 |
Cyassl | Yassl | 2.0.0 | 2.0.0 |
Cyassl | Yassl | 1.5.4 | 1.5.4 |
Cyassl | Yassl | 0.9.0 | 0.9.0 |
Cyassl | Yassl | 0.2.0 | 0.2.0 |
Cyassl | Yassl | 0.9.6 | 0.9.6 |
Cyassl | Yassl | 1.6.5 | 1.6.5 |
Cyassl | Yassl | 1.3.0 | 1.3.0 |
Cyassl | Yassl | 1.4.0 | 1.4.0 |
Cyassl | Yassl | 1.0.2 | 1.0.2 |
Cyassl | Yassl | 1.9.0 | 1.9.0 |
Cyassl | Yassl | * | 2.4.6 |
Cyassl | Yassl | 1.5.0 | 1.5.0 |
Cyassl | Yassl | 0.6.0 | 0.6.0 |
Cyassl | Yassl | 2.0.0 | 2.0.0 |
Cyassl | Yassl | 2.4.0 | 2.4.0 |
Cyassl | Yassl | 0.6.2 | 0.6.2 |
Cyassl | Yassl | 0.6.3 | 0.6.3 |
Cyassl | Yassl | 2.2.0 | 2.2.0 |
Cyassl | Yassl | 1.0.6 | 1.0.6 |
Cyassl | Yassl | 0.9.8 | 0.9.8 |