5.8
CVSSv2

CVE-2013-6450

Published: 01/01/2014 Updated: 07/11/2023
CVSS v2 Base Score: 5.8 | Impact Score: 4.9 | Exploitability Score: 8.6
VMScore: 516
Vector: AV:N/AC:M/Au:N/C:N/I:P/A:P

Vulnerability Summary

The DTLS retransmission implementation in OpenSSL 1.0.0 prior to 1.0.0l and 1.0.1 prior to 1.0.1f does not properly maintain data structures for digest and encryption contexts, which might allow man-in-the-middle malicious users to trigger the use of a different context and cause a denial of service (application crash) by interfering with packet delivery, related to ssl/d1_both.c and ssl/t1_enc.c.

Vulnerable Product Search on Vulmon Subscribe to Product

openssl openssl 1.0.1

openssl openssl 1.0.0c

openssl openssl 1.0.0i

openssl openssl 1.0.0

openssl openssl 1.0.1c

openssl openssl 1.0.0h

openssl openssl 1.0.0e

openssl openssl 1.0.0f

openssl openssl 1.0.0d

openssl openssl 1.0.0j

openssl openssl 1.0.1a

openssl openssl 1.0.1d

openssl openssl 1.0.1b

openssl openssl 1.0.1e

openssl openssl 1.0.0a

openssl openssl 1.0.0b

openssl openssl 1.0.0g

Vendor Advisories

Synopsis Important: openssl security update Type/Severity Security Advisory: Important Topic Updated openssl packages that fix three security issues are now availablefor Red Hat Enterprise Linux 6The Red Hat Security Response Team has rated this update as havingimportant security impact Common Vulnerabili ...
Several security issues were fixed in OpenSSL ...
Debian Bug report logs - #732754 openssl: CVE-2013-6449: crash when using TLS 12 Package: openssl; Maintainer for openssl is Debian OpenSSL Team <pkg-openssl-devel@listsaliothdebianorg>; Source for openssl is src:openssl (PTS, buildd, popcon) Reported by: Salvatore Bonaccorso <carnil@debianorg> Date: Sat, 21 Dec ...
Multiple security issues have been fixed in OpenSSL: The TLS 12 support was susceptible to denial of service and retransmission of DTLS messages was fixed In addition this update disables the insecure Dual_EC_DRBG algorithm (which was unused anyway, see marcinfo/?l=openssl-announce&m=138747119822324&w=2 for further information) an ...
A flaw was found in the way OpenSSL determined which hashing algorithm to use when TLS protocol version 12 was enabled This could possibly cause OpenSSL to use an incorrect hashing algorithm, leading to a crash of an application using the library (CVE-2013-6449) It was discovered that the Datagram Transport Layer Security (DTLS) protocol impleme ...
The DTLS retransmission implementation in OpenSSL 100 before 100l and 101 before 101f does not properly maintain data structures for digest and encryption contexts, which might allow man-in-the-middle attackers to trigger the use of a different context and cause a denial of service (application crash) by interfering with packet delivery, re ...