Vulnerability Details : CVE-2013-6449
The ssl_get_algorithm2 function in ssl/s3_lib.c in OpenSSL before 1.0.2 obtains a certain version number from an incorrect data structure, which allows remote attackers to cause a denial of service (daemon crash) via crafted traffic from a TLS 1.2 client.
Vulnerability category: Denial of service
Exploit prediction scoring system (EPSS) score for CVE-2013-6449
Probability of exploitation activity in the next 30 days: 90.62%
Percentile, the proportion of vulnerabilities that are scored at or less: ~ 99 % EPSS Score History EPSS FAQ
CVSS scores for CVE-2013-6449
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source |
---|---|---|---|---|---|
4.3
|
MEDIUM | AV:N/AC:M/Au:N/C:N/I:N/A:P |
8.6
|
2.9
|
NIST |
CWE ids for CVE-2013-6449
-
Assigned by: nvd@nist.gov (Primary)
References for CVE-2013-6449
-
http://lists.fedoraproject.org/pipermail/package-announce/2014-August/136473.html
[SECURITY] Fedora 20 Update: openssl-1.0.1e-39.fc20
-
http://www.vmware.com/security/advisories/VMSA-2014-0012.html
VMSA-2014-0012.1
-
http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html
Oracle Critical Patch Update - July 2014
-
http://www-01.ibm.com/support/docview.wss?uid=isg400001841
IBM Tivoli Composite Application Manager for Transactions Internet Service Monitoring 7.4 Interim Fix 13 README Tivoli Composite Application Manager for Transactions 7.4.0.0 7.4.0.0-TIV-CAMIS-IF0013 R
-
http://lists.opensuse.org/opensuse-updates/2014-01/msg00012.html
openSUSE-SU-2014:0018-1: moderate: update for openssl
-
http://rt.openssl.org/Ticket/Display.html?id=3200&user=guest&pass=guest
#3200: Crash in OpenSSL 1.0.1e w/TLS 1.2 (under load)
-
http://www.debian.org/security/2014/dsa-2833
Debian -- Security Information -- DSA-2833-1 openssl
-
http://rhn.redhat.com/errata/RHSA-2014-0015.html
RHSA-2014:0015 - Security Advisory - Red Hat Customer Portal
-
http://rhn.redhat.com/errata/RHSA-2014-0041.html
RHSA-2014:0041 - Security Advisory - Red Hat Customer Portal
-
http://seclists.org/fulldisclosure/2014/Dec/23
Full Disclosure: NEW: VMSA-2014-0012 - VMware vSphere product updates address security vulnerabilities
-
http://security.gentoo.org/glsa/glsa-201412-39.xml
OpenSSL: Multiple vulnerabilities (GLSA 201412-39) — Gentoo security
-
http://www.ubuntu.com/usn/USN-2079-1
USN-2079-1: OpenSSL vulnerabilities | Ubuntu security notices
-
http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html
Oracle Critical Patch Update - January 2015
-
http://lists.fedoraproject.org/pipermail/package-announce/2014-August/136470.html
[SECURITY] Fedora 19 Update: openssl-1.0.1e-39.fc19
-
http://lists.fedoraproject.org/pipermail/package-announce/2013-December/124858.html
[SECURITY] Fedora 19 Update: openssl-1.0.1e-36.fc19
-
http://www.securitytracker.com/id/1029548
OpenSSL Incorrect Version Number Used in ssl_get_algorithm2() Lets Remote Users Deny Service - SecurityTracker
-
http://lists.opensuse.org/opensuse-updates/2014-01/msg00031.html
openSUSE-SU-2014:0048-1: moderate: update for openssl
-
http://git.openssl.org/gitweb/?p=openssl.git;a=commit;h=ca989269a2876bae79393bd54c3e72d49975fc75
git.openssl.org Git - openssl.git/commitPatch
-
http://www.securityfocus.com/bid/64530
OpenSSL 'ssl_get_algorithm2()' Function Remote Denial of Service Vulnerability
-
http://lists.opensuse.org/opensuse-updates/2014-01/msg00009.html
openSUSE-SU-2014:0015-1: moderate: update for openssl
-
http://www.securityfocus.com/archive/1/534161/100/0/threaded
SecurityFocus
-
http://www-01.ibm.com/support/docview.wss?uid=isg400001843
IBM Tivoli Composite Application Manager for Transactions Internet Service Monitoring 7.3.0.1 Interim Fix 29 README Tivoli Composite Application Manager for Transactions 7.3.0.1 7.3.0.1-TIV-CAMIS-IF00
-
http://lists.opensuse.org/opensuse-updates/2014-01/msg00006.html
openSUSE-SU-2014:0012-1: moderate: update for openssl
-
http://lists.fedoraproject.org/pipermail/package-announce/2013-December/124854.html
[SECURITY] Fedora 20 Update: openssl-1.0.1e-36.fc20
-
https://bugzilla.redhat.com/show_bug.cgi?id=1045363
1045363 – (CVE-2013-6449) CVE-2013-6449 openssl: crash when using TLS 1.2 caused by use of incorrect hash algorithm
-
https://issues.apache.org/jira/browse/TS-2355
[TS-2355] ATS 4.0.x crashes when using OpenSSL 1.0.1e - ASF JIRA
-
http://lists.fedoraproject.org/pipermail/package-announce/2013-December/124833.html
[SECURITY] Fedora 18 Update: openssl-1.0.1e-36.fc18
Products affected by CVE-2013-6449
- cpe:2.3:a:openssl:openssl:*:*:*:*:*:*:*:*
- cpe:2.3:a:openssl:openssl:1.0.0:beta2:*:*:*:*:*:*
- cpe:2.3:a:openssl:openssl:1.0.0:beta4:*:*:*:*:*:*
- cpe:2.3:a:openssl:openssl:1.0.0:beta3:*:*:*:*:*:*
- cpe:2.3:a:openssl:openssl:1.0.0:beta1:*:*:*:*:*:*
- cpe:2.3:a:openssl:openssl:1.0.0:beta5:*:*:*:*:*:*
- cpe:2.3:a:openssl:openssl:1.0.0:*:*:*:*:*:*:*
- cpe:2.3:a:openssl:openssl:1.0.0a:*:*:*:*:*:*:*
- cpe:2.3:a:openssl:openssl:1.0.0b:*:*:*:*:*:*:*
- cpe:2.3:a:openssl:openssl:1.0.1:beta2:*:*:*:*:*:*
- cpe:2.3:a:openssl:openssl:1.0.1:beta1:*:*:*:*:*:*
- cpe:2.3:a:openssl:openssl:1.0.0g:*:*:*:*:*:*:*
- cpe:2.3:a:openssl:openssl:1.0.0f:*:*:*:*:*:*:*
- cpe:2.3:a:openssl:openssl:1.0.0e:*:*:*:*:*:*:*
- cpe:2.3:a:openssl:openssl:1.0.1c:*:*:*:*:*:*:*
- cpe:2.3:a:openssl:openssl:1.0.1b:*:*:*:*:*:*:*
- cpe:2.3:a:openssl:openssl:1.0.0j:*:*:*:*:*:*:*
- cpe:2.3:a:openssl:openssl:1.0.1d:*:*:*:*:*:*:*
- cpe:2.3:a:openssl:openssl:1.0.1:*:*:*:*:*:*:*
- cpe:2.3:a:openssl:openssl:1.0.0d:*:*:*:*:*:*:*
- cpe:2.3:a:openssl:openssl:1.0.0c:*:*:*:*:*:*:*
- cpe:2.3:a:openssl:openssl:1.0.1a:*:*:*:*:*:*:*
- cpe:2.3:a:openssl:openssl:1.0.1:beta3:*:*:*:*:*:*
- cpe:2.3:a:openssl:openssl:1.0.0i:*:*:*:*:*:*:*
- cpe:2.3:a:openssl:openssl:1.0.0h:*:*:*:*:*:*:*