CVE-2013-6450 — Openssl vulnerability
Severity
5.8MEDIUMNVD
EPSS
22.5%
top 4.15%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedJan 1
Latest updateMay 14
Description
The DTLS retransmission implementation in OpenSSL 1.0.0 before 1.0.0l and 1.0.1 before 1.0.1f does not properly maintain data structures for digest and encryption contexts, which might allow man-in-the-middle attackers to trigger the use of a different context and cause a denial of service (application crash) by interfering with packet delivery, related to ssl/d1_both.c and ssl/t1_enc.c.
CVSS vector
AV:N/AC:M/C:N/I:P/A:PExploitability: 8.6 | Impact: 4.9
Affected Packages3 packages
🔴Vulnerability Details
2📋Vendor Advisories
4Debian▶
CVE-2013-6450: openssl - The DTLS retransmission implementation in OpenSSL 1.0.0 before 1.0.0l and 1.0.1 ...↗2013
💬Community
4Bugzilla▶
CVE-2013-6450 mingw32-openssl: openssl: MiTM due to improper implementation of DTLS retransmission [epel-5]↗2014-01-02
Bugzilla▶
CVE-2013-6450 mingw-openssl: openssl: MiTM due to improper implementation of DTLS retransmission [fedora-all]↗2014-01-02
Bugzilla▶
CVE-2013-6450 openssl: MiTM due to improper implementation of DTLS retransmission [fedora-all]↗2014-01-02