4.3
CVSSv2

CVE-2013-6449

Published: 23/12/2013 Updated: 07/11/2023
CVSS v2 Base Score: 4.3 | Impact Score: 2.9 | Exploitability Score: 8.6
VMScore: 383
Vector: AV:N/AC:M/Au:N/C:N/I:N/A:P

Vulnerability Summary

The ssl_get_algorithm2 function in ssl/s3_lib.c in OpenSSL prior to 1.0.2 obtains a certain version number from an incorrect data structure, which allows remote malicious users to cause a denial of service (daemon crash) via crafted traffic from a TLS 1.2 client.

Vulnerable Product Search on Vulmon Subscribe to Product

openssl openssl 1.0.1

openssl openssl 1.0.0c

openssl openssl 1.0.0i

openssl openssl 1.0.0

openssl openssl 1.0.1c

openssl openssl 1.0.0h

openssl openssl 1.0.0e

openssl openssl 1.0.0f

openssl openssl 1.0.0d

openssl openssl 1.0.0j

openssl openssl 1.0.1a

openssl openssl 1.0.1d

openssl openssl

openssl openssl 1.0.1b

openssl openssl 1.0.0a

openssl openssl 1.0.0b

openssl openssl 1.0.0g

Vendor Advisories

Several security issues were fixed in OpenSSL ...
Synopsis Important: rhev-hypervisor6 security update Type/Severity Security Advisory: Important Topic An updated rhev-hypervisor6 package that fixes multiple security issues isnow availableThe Red Hat Security Response Team has rated this update as havingimportant security impact Common Vulnerability Scor ...
Synopsis Important: openssl security update Type/Severity Security Advisory: Important Topic Updated openssl packages that fix three security issues are now availablefor Red Hat Enterprise Linux 6The Red Hat Security Response Team has rated this update as havingimportant security impact Common Vulnerabili ...
Debian Bug report logs - #732754 openssl: CVE-2013-6449: crash when using TLS 12 Package: openssl; Maintainer for openssl is Debian OpenSSL Team <pkg-openssl-devel@listsaliothdebianorg>; Source for openssl is src:openssl (PTS, buildd, popcon) Reported by: Salvatore Bonaccorso <carnil@debianorg> Date: Sat, 21 Dec ...
Multiple security issues have been fixed in OpenSSL: The TLS 12 support was susceptible to denial of service and retransmission of DTLS messages was fixed In addition this update disables the insecure Dual_EC_DRBG algorithm (which was unused anyway, see marcinfo/?l=openssl-announce&m=138747119822324&w=2 for further information) an ...
A flaw was found in the way OpenSSL determined which hashing algorithm to use when TLS protocol version 12 was enabled This could possibly cause OpenSSL to use an incorrect hashing algorithm, leading to a crash of an application using the library (CVE-2013-6449) It was discovered that the Datagram Transport Layer Security (DTLS) protocol impleme ...
The ssl_get_algorithm2 function in ssl/s3_libc in OpenSSL before 102 obtains a certain version number from an incorrect data structure, which allows remote attackers to cause a denial of service (daemon crash) via crafted traffic from a TLS 12 client ...

References

CWE-310https://issues.apache.org/jira/browse/TS-2355http://rt.openssl.org/Ticket/Display.html?id=3200&user=guest&pass=guesthttps://bugzilla.redhat.com/show_bug.cgi?id=1045363http://www.debian.org/security/2014/dsa-2833http://lists.fedoraproject.org/pipermail/package-announce/2013-December/124854.htmlhttp://lists.fedoraproject.org/pipermail/package-announce/2013-December/124833.htmlhttp://lists.fedoraproject.org/pipermail/package-announce/2013-December/124858.htmlhttp://www.securitytracker.com/id/1029548http://lists.opensuse.org/opensuse-updates/2014-01/msg00012.htmlhttp://www.securityfocus.com/bid/64530http://lists.opensuse.org/opensuse-updates/2014-01/msg00006.htmlhttp://lists.opensuse.org/opensuse-updates/2014-01/msg00009.htmlhttp://www.ubuntu.com/usn/USN-2079-1http://rhn.redhat.com/errata/RHSA-2014-0015.htmlhttp://lists.opensuse.org/opensuse-updates/2014-01/msg00031.htmlhttp://rhn.redhat.com/errata/RHSA-2014-0041.htmlhttp://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.htmlhttp://www-01.ibm.com/support/docview.wss?uid=isg400001843http://www-01.ibm.com/support/docview.wss?uid=isg400001841http://www.vmware.com/security/advisories/VMSA-2014-0012.htmlhttp://seclists.org/fulldisclosure/2014/Dec/23http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.htmlhttp://security.gentoo.org/glsa/glsa-201412-39.xmlhttp://lists.fedoraproject.org/pipermail/package-announce/2014-August/136473.htmlhttp://lists.fedoraproject.org/pipermail/package-announce/2014-August/136470.htmlhttp://www.securityfocus.com/archive/1/534161/100/0/threadedhttp://git.openssl.org/gitweb/?p=openssl.git%3Ba=commit%3Bh=ca989269a2876bae79393bd54c3e72d49975fc75https://usn.ubuntu.com/2079-1/https://nvd.nist.govhttps://access.redhat.com/security/cve/cve-2013-6449