Vulnerability in TLS Could Allow Information Disclosure (2655992) (uncredentialed check)

medium Nessus Plugin ID 60016

Synopsis

It may be possible to obtain sensitive information from the remote host with TLS-enabled services.

Description

The remote TLS server does not verify block cipher padding when using a cipher suite that employs a block cipher such as AES and DES. The lack of padding checking can allow encrypted TLS traffic to be decrypted. This vulnerability could allow for the decryption of HTTPS traffic by an unauthorized third party.

Solution

Microsoft has released a set of patches for Windows XP, 2003, Vista, 2008, 7, and 2008 R2.

For other TLS implementations, contact the vendor for update.

See Also

https://docs.microsoft.com/en-us/security-updates/SecurityBulletins/2012/ms12-049

https://www.openssl.org/~bodo/tls-cbc.txt

Plugin Details

Severity: Medium

ID: 60016

File Name: tls_block_cipher_padding_verify.nbin

Version: 1.218

Type: remote

Family: General

Published: 7/18/2012

Updated: 9/11/2024

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Low

Score: 1.4

CVSS v2

Risk Factor: Medium

Base Score: 4.3

Temporal Score: 3.6

Vector: CVSS2#AV:N/AC:M/Au:N/C:P/I:N/A:N

CVSS Score Source: CVE-2012-1870

CVSS v3

Risk Factor: Medium

Base Score: 5.3

Temporal Score: 4.6

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N

Temporal Vector: CVSS:3.0/E:U/RL:O/RC:C

Vulnerability Information

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 7/10/2012

Vulnerability Publication Date: 7/10/2012

Reference Information

CVE: CVE-2012-1870

BID: 54304

IAVA: 2012-A-0108

MSFT: MS12-049

MSKB: 2655992