The TLS implementation in GnuTLS before 2.12.23, 3.0.x before 3.0.28, and 3.1.x before 3.1.7 does not properly consider timing side-channel attacks on a noncompliant MAC check operation during the processing of malformed CBC padding, which allows remote attackers to conduct distinguishing attacks and plaintext-recovery attacks via statistical analysis of timing data for crafted packets, a related issue to CVE-2013-0169.
{ "availability": "No subscription required", "binaries": [ { "binary_name": "guile-gnutls", "binary_version": "3.2.11-2ubuntu1" }, { "binary_name": "libgnutls-xssl0", "binary_version": "3.2.11-2ubuntu1" }, { "binary_name": "libgnutls28", "binary_version": "3.2.11-2ubuntu1" }, { "binary_name": "libgnutls28-dbg", "binary_version": "3.2.11-2ubuntu1" }, { "binary_name": "libgnutls28-dev", "binary_version": "3.2.11-2ubuntu1" }, { "binary_name": "libgnutlsxx28", "binary_version": "3.2.11-2ubuntu1" } ], "ubuntu_priority": "medium" }