CVE-2013-6450
01.01.2014, 16:05
The DTLS retransmission implementation in OpenSSL 1.0.0 before 1.0.0l and 1.0.1 before 1.0.1f does not properly maintain data structures for digest and encryption contexts, which might allow man-in-the-middle attackers to trigger the use of a different context and cause a denial of service (application crash) by interfering with packet delivery, related to ssl/d1_both.c and ssl/t1_enc.c.Enginsight
Vendor | Product | Version |
---|---|---|
openssl | openssl | 1.0.0 |
openssl | openssl | 1.0.0:beta1 |
openssl | openssl | 1.0.0:beta2 |
openssl | openssl | 1.0.0:beta3 |
openssl | openssl | 1.0.0:beta4 |
openssl | openssl | 1.0.0:beta5 |
openssl | openssl | 1.0.0a:a |
openssl | openssl | 1.0.0b:b |
openssl | openssl | 1.0.0c:c |
openssl | openssl | 1.0.0d:d |
openssl | openssl | 1.0.0e:e |
openssl | openssl | 1.0.0f:f |
openssl | openssl | 1.0.0g:g |
openssl | openssl | 1.0.0h:h |
openssl | openssl | 1.0.0i:i |
openssl | openssl | 1.0.0j:j |
openssl | openssl | 1.0.1 |
openssl | openssl | 1.0.1:beta1 |
openssl | openssl | 1.0.1:beta2 |
openssl | openssl | 1.0.1:beta3 |
openssl | openssl | 1.0.1a:a |
openssl | openssl | 1.0.1b:b |
openssl | openssl | 1.0.1c:c |
openssl | openssl | 1.0.1d:d |
openssl | openssl | 1.0.1e:e |
𝑥
= Vulnerable software versions

Debian Releases

Ubuntu Releases
Common Weakness Enumeration