Vulnerability CVE-2013-6449

See in [MITRE] [NVD]

Search:
WLB2

Vulnerability CVE-2013-6449


Published: 2013-12-23   Modified: 2014-01-23

Description:
The ssl_get_algorithm2 function in ssl/s3_lib.c in OpenSSL before 1.0.2 obtains a certain version number from an incorrect data structure, which allows remote attackers to cause a denial of service (daemon crash) via crafted traffic from a TLS 1.2 client.

See advisories in our WLB2 database:
Topic
Author
Date
Medium Risk
OpenSSL 1.0.1e Incorrect Version Number ssl_get_algorithm2() Remote DoS
Dr. Stephen Hens...
05.01.2014


Type:
CWE-310 (Cryptographic Issues)

Vendor: Openssl
Product: Openssl 
Version:
1.0.1e
1.0.1d
1.0.1c
1.0.1b
1.0.1a
1.0.1
1.0.0j
1.0.0i
1.0.0h
1.0.0g
1.0.0f
1.0.0e
1.0.0d
1.0.0c
1.0.0b
1.0.0a
1.0.0

CVSS2 => (AV:N/AC:M/Au:N/C:N/I:N/A:P)

CVSS Base Score
Impact Subscore
Exploitability Subscore
4.3/10
2.9/10
8.6/10
Exploit range
Attack complexity
Authentication
Remote
Medium
No required
Confidentiality impact
Integrity impact
Availability impact
None
None
Partial

Related CVE
[ CVE-2010-5298 ]
Race condition in the ssl3_read_bytes function in s3_pkt.c in OpenSSL through 1.0.1g, when ...
[ CVE-2014-0160 ]
The (1) TLS and (2) DTLS implementations in OpenSSL 1.0.1 before 1.0.1g do not properly han...
[ CVE-2014-0076 ]
The Montgomery ladder implementation in OpenSSL through 1.0.0l does not ensure that certain...
[ CVE-2013-4353 ]
The ssl3_take_mac function in ssl/s3_both.c in OpenSSL 1.0.1 before 1.0.1f allows remote TL...
[ CVE-2013-6450 ]
The DTLS retransmission implementation in OpenSSL 1.0.0 before 1.0.0l and 1.0.1 before 1.0....
[ CVE-2013-0169 ]
The TLS protocol 1.1 and 1.2 and the DTLS protocol 1.0 and 1.2, as used in OpenSSL, OpenJDK...
[ CVE-2013-0166 ]
OpenSSL before 0.9.8y, 1.0.0 before 1.0.0k, and 1.0.1 before 1.0.1d does not properly perfo...
[ CVE-2012-2686 ]
crypto/evp/e_aes_cbc_hmac_sha1.c in the AES-NI functionality in the TLS 1.1 and 1.2 impleme...
[ CVE-2011-5095 ]
The Diffie-Hellman key-exchange implementation in OpenSSL 0.9.8, when FIPS mode is enabled,...
[ CVE-2011-1473 ]
** DISPUTED ** OpenSSL before 0.9.8l, and 0.9.8m through 1.x, does not properly restrict cl...

References:
http://git.openssl.org/gitweb/?p=openssl.git;a=commit;h=ca989269a2876bae79393bd54c3e72d49975fc75
https://issues.apache.org/jira/browse/TS-2355
https://bugzilla.redhat.com/show_bug.cgi?id=1045363
http://www.ubuntu.com/usn/USN-2079-1
http://www.securitytracker.com/id/1029548
http://www.securityfocus.com/bid/64530
http://www.debian.org/security/2014/dsa-2833
http://rt.openssl.org/Ticket/Display.html?id=3200&user=guest&pass=guest
http://rhn.redhat.com/errata/RHSA-2014-0015.html
http://lists.opensuse.org/opensuse-updates/2014-01/msg00031.html
http://lists.opensuse.org/opensuse-updates/2014-01/msg00012.html
http://lists.opensuse.org/opensuse-updates/2014-01/msg00009.html
http://lists.opensuse.org/opensuse-updates/2014-01/msg00006.html
http://lists.fedoraproject.org/pipermail/package-announce/2013-December/124858.html
http://lists.fedoraproject.org/pipermail/package-announce/2013-December/124854.html
http://lists.fedoraproject.org/pipermail/package-announce/2013-December/124833.html
Copyright 2014, cxsecurity.com