GNUTLS-SA-2013-1 (lucky thirteen) CVE-2013-0169 CVE-2013-1619
Thijs Kinkhorst
thijs at debian.org
Wed Feb 6 10:21:38 UTC 2013
On Wed, February 6, 2013 10:22, Andreas Metzler wrote:
> Hello,
>
> sorry for the delayed pointer:
>
> -----------------------
> Nadhem Alfardan and Kenny Paterson devised an attack that recovers
> some bits of the plaintext of a GnuTLS session that utilizes that CBC
> ciphersuites, by using timing information.
>
> In order for the attack to work the client must operate as follows. It
> connects to a server, it sends some (encrypted) data that will be
> intercepted by the attacker, who will terminate the client's
> connection abnormally (i.e. the client will receive a premature
> termination error). The client should repeat that, multiple times.
> [...]
> How to mitigate the attack?
>
> Do not enable the CBC ciphersuites, prefer ARCFOUR or GCM modes.
> Upgrade to the latest GnuTLS version (3.1.7, 3.0.28, or 2.12.23).
> -----------------------
> http://www.isg.rhul.ac.uk/tls/
>
> Writeup for GnuTLS:
> http://nikmav.blogspot.be/2013/02/time-is-money-for-cbc-ciphersuites.html
>
> Debian's affected versions:
>
> Package dist Version up to fixed in
> -----------------+----------------+----------------------------------
> gnutls26 exp 2.12.22-1 I will upload 2.12.23-1
> gnutls26 unstable 2.12.20-3 2.12.20-4
> gnutls26 testing 2.12.20-3 I will ask whether 2.12.20-4 can
> propagate, otherwise I will make a
> separate upload
> gnutls26 stable 2.8.6-1+squeeze2 -
>
> Sadly the patch does not apply directly to stable because 2.8.x is
> missing
> <http://gitorious.org/gnutls/gnutls/commit/32a7367601a3fda0aef07f5481c89e38d9c85b4a>
> As I am a) slightly ill and b) not a programmer I will not try my
> hands on this. :-(
>
> gnutls28 exp 3.1.6-1 3.1.7-1 (currently in NEW)
> gnutls28 unstable 3.0.22-2 not yet
> gnutls28 testing 3.0.20-3 not yet
> gnutls28 stable N/A N/A
>
> Regarding gnutls28 I will consult with debian-release.
Thanks for the detailed information. We were aware of the issue. Please
keep us posted on the fixed status of the variants in the various Debian
suites.
Cheers,
Thijs
More information about the Pkg-gnutls-maint
mailing list