First published: Fri Feb 08 2013(Updated: )
The TLS implementation in Opera before 12.13 does not properly consider timing side-channel attacks on a MAC check operation during the processing of malformed CBC padding, which allows remote attackers to conduct distinguishing attacks and plaintext-recovery attacks via statistical analysis of timing data for crafted packets, a related issue to CVE-2013-0169.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Opera | <=12.12 | |
Opera | =12.00 | |
Opera | =12.00-beta | |
Opera | =12.01 | |
Opera | =12.02 | |
Opera | =12.10 | |
Opera | =12.10-beta | |
Opera | =12.11 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2013-1618 is considered a high severity vulnerability due to its potential for timing side-channel attacks.
CVE-2013-1618 affects Opera versions prior to 12.13, including 12.00 through 12.12.
To fix CVE-2013-1618, users should upgrade their Opera browser to version 12.13 or later.
CVE-2013-1618 allows remote attackers to conduct distinguishing and plaintext-recovery attacks through statistical analysis.
CVE-2013-1618 involves improper handling of CBC padding during the MAC check operation in the TLS implementation.