[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

250038

 
 

909

 
 

195843

 
 

282

Paid content will be excluded from the download.


Download | Alert*
OVAL

Plaintext-recovery attack vulnerability in Opera via statistical analysis of timing data for crafted packets (Mac OS X)

ID: oval:org.secpod.oval:def:9401Date: (C)2013-02-26   (M)2023-12-03
Class: VULNERABILITYFamily: macos




The host is installed with Opera before 12.13 and is prone to plaintext-recovery attack vulnerability. A flaw is present in the application, which does not properly consider timing side-channel attacks on a MAC check operation during the processing of malformed CBC padding. Successful exploitation allows attackers to conduct distinguishing attacks and plaintext-recovery attacks via statistical analysis of timing data for crafted packets.

Platform:
Apple Mac OS 14
Apple Mac OS 13
Apple Mac OS 12
Apple Mac OS 11
Apple Mac OS X 10.15
Apple Mac OS X 10.14
Apple Mac OS X 10.8
Apple Mac OS X 10.9
Apple Mac OS X 10.10
Apple Mac OS X 10.11
Apple Mac OS X 10.12
Apple Mac OS X 10.13
Apple Mac OS X Server 10.8
Apple Mac OS X Server 10.9
Apple Mac OS X Server 10.10
Product:
Opera Browser
Reference:
CVE-2013-1618
CVE    1
CVE-2013-1618
CPE    1
cpe:/a:opera:opera

© SecPod Technologies