Bug 908425 - (CVE-2013-1622) CVE-2013-1622 polarssl: improper MAC check if sanity check fails leads to DoS
CVE-2013-1622 polarssl: improper MAC check if sanity check fails leads to DoS
Status: CLOSED NOTABUG
Product: Security Response
Classification: Other
Component: vulnerability (Show other bugs)
unspecified
All Linux
low Severity low
: ---
: ---
Assigned To: Red Hat Product Security
impact=low,public=20130204,reported=2...
: Security
Depends On: 907982
Blocks: 907592
  Show dependency treegraph
 
Reported: 2013-02-06 11:49 EST by Vincent Danen
Modified: 2013-02-27 20:20 EST (History)
1 user (show)

See Also:
Fixed In Version: polarssl 1.2.5
Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of:
Environment:
Last Closed: 2013-02-27 20:20:59 EST
Type: ---
Regression: ---
Mount Type: ---
Documentation: ---
CRM:
Verified Versions:
Category: ---
oVirt Team: ---
RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: ---


Attachments (Terms of Use)

  None (edit)
Description Vincent Danen 2013-02-06 11:49:04 EST
In addition to the fix for CVE-2013-0169, PolarSSL 1.2.5 corrects the following problem:

"PolarSSL ... it does not perform any MAC check if this
sanity check fails, but instead exits immediately. This would
render the implementation vulnerable to a simple timing-based
distinguishing attack." (requires a non-default configuration with
"TLS alert messages when decryption errors are encountered")
Comment 1 Vincent Danen 2013-02-06 11:51:23 EST
Created polarssl tracking bugs for this issue

Affects: fedora-all [bug 907982]
Comment 2 Mads Kiilerich 2013-02-27 20:20:59 EST
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1622 says
** REJECT ** DO NOT USE THIS CANDIDATE NUMBER.
ConsultIDs: none.
Reason: This candidate is not a security issue. Further investigation showed that, because of RFC noncompliance, no version or configuration of the product had the vulnerability previously associated with this ID.
Notes: none.

Note You need to log in before you can comment on or make changes to this bug.