Back to search

Apple Java security update for CVE-2013-0169

Severity CVSS Published Added Modified
3 (AV:N/AC:H/Au:N/C:P/I:N/A:N) February 08, 2013 March 03, 2013 March 03, 2014

Description

The TLS protocol 1.1 and 1.2 and the DTLS protocol 1.0 and 1.2, as used in OpenSSL, OpenJDK, PolarSSL, and other products, do not properly consider timing side-channel attacks on a MAC check requirement during the processing of malformed CBC padding, which allows remote attackers to conduct distinguishing attacks and plaintext-recovery attacks via statistical analysis of timing data for crafted packets, aka the "Lucky Thirteen" issue.

Free Nexpose Download

Discover, prioritize, and remediate security risks today!

 Download now

References

Solution

Upgrade to Apple Java version 1.6.0.41

Upgrade your copy of Apple Java to 1.6.0.41 by selecting 'Software Update' from the Apple menu, or by using the softwareupdate utility.

Alternatively, Intel-based Macs running OS X 10.7.3 or later may download Java 7 directly from Oracle.

Related Vulnerabilities