Vulnerabilities
Vulnerable Software

Vulnerability Details CVE-2013-6450

The DTLS retransmission implementation in OpenSSL 1.0.0 before 1.0.0l and 1.0.1 before 1.0.1f does not properly maintain data structures for digest and encryption contexts, which might allow man-in-the-middle attackers to trigger the use of a different context and cause a denial of service (application crash) by interfering with packet delivery, related to ssl/d1_both.c and ssl/t1_enc.c.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.277
EPSS Ranking 96.3%
CVSS Severity
CVSS v2 Score 5.8
References
Products affected by CVE-2013-6450
  • Openssl » Openssl » Version: 1.0.0
    cpe:2.3:a:openssl:openssl:1.0.0
  • Openssl » Openssl » Version: 1.0.0a
    cpe:2.3:a:openssl:openssl:1.0.0a
  • Openssl » Openssl » Version: 1.0.0b
    cpe:2.3:a:openssl:openssl:1.0.0b
  • Openssl » Openssl » Version: 1.0.0c
    cpe:2.3:a:openssl:openssl:1.0.0c
  • Openssl » Openssl » Version: 1.0.0d
    cpe:2.3:a:openssl:openssl:1.0.0d
  • Openssl » Openssl » Version: 1.0.0e
    cpe:2.3:a:openssl:openssl:1.0.0e
  • Openssl » Openssl » Version: 1.0.0f
    cpe:2.3:a:openssl:openssl:1.0.0f
  • Openssl » Openssl » Version: 1.0.0g
    cpe:2.3:a:openssl:openssl:1.0.0g
  • Openssl » Openssl » Version: 1.0.0h
    cpe:2.3:a:openssl:openssl:1.0.0h
  • Openssl » Openssl » Version: 1.0.0i
    cpe:2.3:a:openssl:openssl:1.0.0i
  • Openssl » Openssl » Version: 1.0.0j
    cpe:2.3:a:openssl:openssl:1.0.0j
  • Openssl » Openssl » Version: 1.0.1
    cpe:2.3:a:openssl:openssl:1.0.1
  • Openssl » Openssl » Version: 1.0.1a
    cpe:2.3:a:openssl:openssl:1.0.1a
  • Openssl » Openssl » Version: 1.0.1b
    cpe:2.3:a:openssl:openssl:1.0.1b
  • Openssl » Openssl » Version: 1.0.1c
    cpe:2.3:a:openssl:openssl:1.0.1c
  • Openssl » Openssl » Version: 1.0.1d
    cpe:2.3:a:openssl:openssl:1.0.1d
  • Openssl » Openssl » Version: 1.0.1e
    cpe:2.3:a:openssl:openssl:1.0.1e


Contact Us

Shodan ® - All rights reserved