Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2013-6450

Опубликовано: 01 янв. 2014
Источник: ubuntu
Приоритет: medium
EPSS Средний
CVSS2: 5.8

Описание

The DTLS retransmission implementation in OpenSSL 1.0.0 before 1.0.0l and 1.0.1 before 1.0.1f does not properly maintain data structures for digest and encryption contexts, which might allow man-in-the-middle attackers to trigger the use of a different context and cause a denial of service (application crash) by interfering with packet delivery, related to ssl/d1_both.c and ssl/t1_enc.c.

РелизСтатусПримечание
devel

not-affected

1.0.1f-1ubuntu1
lucid

not-affected

precise

released

1.0.1-4ubuntu5.11
quantal

released

1.0.1c-3ubuntu2.6
raring

released

1.0.1c-4ubuntu8.2
saucy

released

1.0.1e-3ubuntu1.1
upstream

needs-triage

Показывать по

EPSS

Процентиль: 96%
0.27726
Средний

5.8 Medium

CVSS2

Связанные уязвимости

redhat
больше 11 лет назад

The DTLS retransmission implementation in OpenSSL 1.0.0 before 1.0.0l and 1.0.1 before 1.0.1f does not properly maintain data structures for digest and encryption contexts, which might allow man-in-the-middle attackers to trigger the use of a different context and cause a denial of service (application crash) by interfering with packet delivery, related to ssl/d1_both.c and ssl/t1_enc.c.

nvd
больше 11 лет назад

The DTLS retransmission implementation in OpenSSL 1.0.0 before 1.0.0l and 1.0.1 before 1.0.1f does not properly maintain data structures for digest and encryption contexts, which might allow man-in-the-middle attackers to trigger the use of a different context and cause a denial of service (application crash) by interfering with packet delivery, related to ssl/d1_both.c and ssl/t1_enc.c.

debian
больше 11 лет назад

The DTLS retransmission implementation in OpenSSL 1.0.0 before 1.0.0l ...

github
больше 3 лет назад

The DTLS retransmission implementation in OpenSSL 1.0.0 before 1.0.0l and 1.0.1 before 1.0.1f does not properly maintain data structures for digest and encryption contexts, which might allow man-in-the-middle attackers to trigger the use of a different context and cause a denial of service (application crash) by interfering with packet delivery, related to ssl/d1_both.c and ssl/t1_enc.c.

fstec
больше 11 лет назад

Уязвимости операционной системы Debian GNU/Linux, позволяющие удаленному злоумышленнику нарушить целостность и доступность защищаемой информации

EPSS

Процентиль: 96%
0.27726
Средний

5.8 Medium

CVSS2