Description
The TLS protocol 1.1 and 1.2 and the DTLS protocol 1.0 and 1.2, as used in OpenSSL, OpenJDK, PolarSSL, and other products, do not properly consider timing side-channel attacks on a MAC check requirement during the processing of malformed CBC padding, which allows remote attackers to conduct distinguishing attacks and plaintext-recovery attacks via statistical analysis of timing data for crafted packets, aka the "Lucky Thirteen" issue.
Remediation
References
Related Vulnerabilities
Atlassian Confluence Server-Side Request Forgery (SSRF) Vulnerability (CVE-2021-26072)
PHP Numeric Errors Vulnerability (CVE-2008-2107)
MODX Improper Control of Generation of Code ('Code Injection') Vulnerability (CVE-2017-7324)
OpenSSL NULL Pointer Dereference Vulnerability (CVE-2023-0217)
Apache Tomcat Cross-Site Request Forgery (CSRF) Vulnerability (CVE-2013-6357)