First published: Fri Feb 08 2013(Updated: )
Array index error in the SSL module in PolarSSL before 1.2.5 might allow remote attackers to cause a denial of service via vectors involving a crafted padding-length value during validation of CBC padding in a TLS session, a different vulnerability than CVE-2013-0169.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
PolarSSL | <=1.2.4 | |
PolarSSL | =0.10.0 | |
PolarSSL | =0.10.1 | |
PolarSSL | =0.11.0 | |
PolarSSL | =0.11.1 | |
PolarSSL | =0.12.0 | |
PolarSSL | =0.12.1 | |
PolarSSL | =0.13.1 | |
PolarSSL | =0.14.0 | |
PolarSSL | =0.14.2 | |
PolarSSL | =0.14.3 | |
PolarSSL | =0.99-pre1 | |
PolarSSL | =0.99-pre3 | |
PolarSSL | =0.99-pre4 | |
PolarSSL | =0.99-pre5 | |
PolarSSL | =1.0.0 | |
PolarSSL | =1.1.0 | |
PolarSSL | =1.1.0-rc0 | |
PolarSSL | =1.1.0-rc1 | |
PolarSSL | =1.1.1 | |
PolarSSL | =1.1.2 | |
PolarSSL | =1.1.3 | |
PolarSSL | =1.1.4 | |
PolarSSL | =1.1.5 | |
PolarSSL | =1.2.0 | |
PolarSSL | =1.2.1 | |
PolarSSL | =1.2.2 | |
PolarSSL | =1.2.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2013-1621 has been categorized as a moderate severity vulnerability, primarily impacting the availability of systems using affected PolarSSL versions.
To fix CVE-2013-1621, upgrade PolarSSL to version 1.2.5 or later, which resolves the array index error in the SSL module.
CVE-2013-1621 can be exploited to perform denial-of-service attacks by causing a TLS session to fail during CBC padding validation.
CVE-2013-1621 affects PolarSSL versions prior to 1.2.5, including all versions from 0.10.0 up to 1.2.4.
No official workaround is provided for CVE-2013-1621, and upgrading to a patched version is strongly recommended for security.