Description
The DTLS retransmission implementation in OpenSSL 1.0.0 before 1.0.0l and 1.0.1 before 1.0.1f does not properly maintain data structures for digest and encryption contexts, which might allow man-in-the-middle attackers to trigger the use of a different context and cause a denial of service (application crash) by interfering with packet delivery, related to ssl/d1_both.c and ssl/t1_enc.c.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
Debian DSA |
DSA-2833-1 | openssl security update |
Ubuntu USN |
USN-2079-1 | OpenSSL vulnerabilities |
References
History
No history.
Status: PUBLISHED
Assigner: redhat
Published:
Updated: 2024-08-06T17:39:01.167Z
Reserved: 2013-11-04T00:00:00.000Z
Link: CVE-2013-6450
No data.
Status : Modified
Published: 2014-01-01T16:05:15.017
Modified: 2026-04-29T01:13:23.040
Link: CVE-2013-6450
OpenCVE Enrichment
No data.
Weaknesses
Debian DSA
Ubuntu USN