#VU32590 Cryptographic issues in OpenSSL - CVE-2013-6450


| Updated: 2020-07-28

Vulnerability identifier: #VU32590

Vulnerability risk: Medium

CVSSv4.0: 2.7 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N/E:U/U:Green]

CVE-ID: CVE-2013-6450

CWE-ID: CWE-310

Exploitation vector: Network

Exploit availability: No

Vulnerable software:
OpenSSL
Server applications / Encryption software

Vendor: OpenSSL Software Foundation

Description

The vulnerability allows a remote non-authenticated attacker to manipulate or delete data.

The DTLS retransmission implementation in OpenSSL 1.0.0 before 1.0.0l and 1.0.1 before 1.0.1f does not properly maintain data structures for digest and encryption contexts, which might allow man-in-the-middle attackers to trigger the use of a different context and cause a denial of service (application crash) by interfering with packet delivery, related to ssl/d1_both.c and ssl/t1_enc.c.

Mitigation
Install update from vendor's website.

Vulnerable software versions

OpenSSL: 1.0.0c - 1.0.0


External links
https://git.openssl.org/gitweb/?p=openssl.git;a=commit;h=34628967f1e65dc8f34e000f0f5518e21afbfc7b
https://lists.fedoraproject.org/pipermail/package-announce/2014-August/136470.html
https://lists.fedoraproject.org/pipermail/package-announce/2014-August/136473.html
https://lists.opensuse.org/opensuse-updates/2014-01/msg00031.html
https://lists.opensuse.org/opensuse-updates/2014-01/msg00032.html
https://rhn.redhat.com/errata/RHSA-2014-0015.html
https://seclists.org/fulldisclosure/2014/Dec/23
https://security.gentoo.org/glsa/glsa-201412-39.xml
https://www.debian.org/security/2014/dsa-2833
https://www.openssl.org/news/vulnerabilities.html
https://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html
https://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html
https://www.securityfocus.com/archive/1/534161/100/0/threaded
https://www.securityfocus.com/bid/64618
https://www.securitytracker.com/id/1029549
https://www.securitytracker.com/id/1031594
https://www.ubuntu.com/usn/USN-2079-1
https://www.vmware.com/security/advisories/VMSA-2014-0012.html
https://www-01.ibm.com/support/docview.wss?uid=isg400001841
https://www-01.ibm.com/support/docview.wss?uid=isg400001843
https://puppet.com/security/cve/cve-2013-6450
https://security-tracker.debian.org/tracker/CVE-2013-6450


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.


Latest bulletins with this vulnerability