Skip to content

tlslite-ng off-by-one error on mac checking

Moderate severity GitHub Reviewed Published Jul 12, 2018 to the GitHub Advisory Database • Updated Sep 5, 2023

Package

pip tlslite-ng (pip)

Affected versions

< 0.7.4

Patched versions

0.7.4

Description

tlslite-ng version 0.7.3 and earlier, since commit d7b288316bca7bcdd082e6ccff5491e241305233 contains a CWE-354: Improper Validation of Integrity Check Value vulnerability in TLS implementation, tlslite/utils/constanttime.py: ct_check_cbc_mac_and_pad(); line end_pos = data_len - 1 - mac.digest_size that can result in an attacker manipulating the TLS ciphertext which will not be detected by receiving tlslite-ng. This attack appears to be exploitable via man in the middle on a network connection. This vulnerability appears to have been fixed after commit 3674815d1b0f7484454995e2737a352e0a6a93d8.

References

Published to the GitHub Advisory Database Jul 12, 2018
Reviewed Jun 16, 2020
Last updated Sep 5, 2023

Severity

Moderate
5.9
/ 10

CVSS base metrics

Attack vector
Network
Attack complexity
High
Privileges required
None
User interaction
None
Scope
Unchanged
Confidentiality
None
Integrity
High
Availability
None
CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N

Weaknesses

CVE ID

CVE-2018-1000159

GHSA ID

GHSA-cwh5-3cw7-4286

Source code

Loading Checking history
See something to contribute? Suggest improvements for this vulnerability.