{"id":"CVE-2018-1000159","details":"tlslite-ng version 0.7.3 and earlier, since commit d7b288316bca7bcdd082e6ccff5491e241305233 contains a CWE-354: Improper Validation of Integrity Check Value vulnerability in TLS implementation, tlslite/utils/constanttime.py: ct_check_cbc_mac_and_pad(); line \"end_pos = data_len - 1 - mac.digest_size\" that can result in an attacker manipulating the TLS ciphertext which will not be detected by receiving tlslite-ng. This attack appears to be exploitable via man in the middle on a network connection. This vulnerability appears to have been fixed after commit 3674815d1b0f7484454995e2737a352e0a6a93d8.","aliases":["GHSA-cwh5-3cw7-4286","PYSEC-2018-31"],"modified":"2026-03-14T09:27:00.859566Z","published":"2018-04-18T19:29:00.333Z","references":[{"type":"ADVISORY","url":"https://github.com/tomato42/tlslite-ng/pull/234"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/tomato42/tlslite-ng","events":[{"introduced":"0"},{"last_affected":"2f24f4edf4645aa6ae597aa768fb9ba7da686a7f"}],"database_specific":{"versions":[{"introduced":"0"},{"last_affected":"0.7.3"}]}}],"versions":["fork-start","v0.3.9x","v0.4.1","v0.4.2","v0.4.3","v0.4.8","v0.5.0","v0.5.0-beta3","v0.5.0-beta4","v0.5.0-beta6","v0.5.1","v0.6.0","v0.6.0-alpha1","v0.6.0-alpha2","v0.6.0-alpha3","v0.6.0-alpha4","v0.6.0-alpha5","v0.6.0-beta1","v0.7.0","v0.7.0-alpha1","v0.7.0-alpha2","v0.7.0-alpha3","v0.7.0-alpha4","v0.7.0-alpha5","v0.7.0-alpha6","v0.7.0-alpha7","v0.7.0-alpha8","v0.7.0-alpha9","v0.7.0-beta1","v0.7.1","v0.7.2","v0.7.3"],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2018-1000159.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N"}]}