CVE-2013-4353

The ssl3_take_mac function in ssl/s3_both.c in OpenSSL 1.0.1 before 1.0.1f allows remote TLS servers to cause a denial of service (NULL pointer dereference and application crash) via a crafted Next Protocol Negotiation record in a TLS handshake.

Published at
2014-01-09T01:55Z
3763 days ago
Modified
2017-01-07T02:59Z
2669 days ago
CWE-20
Problem type

References


URLType
www.openssl.org
http://www.openssl.org/news/vulnerabilities.html
CONFIRM
git.openssl.org
http://git.openssl.org/gitweb/?p=openssl.git;a=blob_plain;f=CHANGES;hb=refs/heads/OpenSSL_1_0_1-stable
CONFIRM
git.openssl.org
http://git.openssl.org/gitweb/?p=openssl.git;a=commit;h=197e0ea817ad64820789d86711d55ff50d71f631
CONFIRM
bugzilla.redhat.com
https://bugzilla.redhat.com/show_bug.cgi?id=1049058
CONFIRM
RHSA-2014:0015
http://rhn.redhat.com/errata/RHSA-2014-0015.html
REDHAT
USN-2079-1
http://www.ubuntu.com/usn/USN-2079-1
UBUNTU
DSA-2837
http://www.debian.org/security/2014/dsa-2837
DEBIAN
openSUSE-SU-2014:0096
http://lists.opensuse.org/opensuse-updates/2014-01/msg00067.html
SUSE
RHSA-2014:0041
http://rhn.redhat.com/errata/RHSA-2014-0041.html
REDHAT
openSUSE-SU-2014:0094
http://lists.opensuse.org/opensuse-updates/2014-01/msg00065.html
SUSE
openSUSE-SU-2014:0099
http://lists.opensuse.org/opensuse-updates/2014-01/msg00070.html
SUSE
www.splunk.com
http://www.splunk.com/view/SP-CAAAMB3
CONFIRM
www-01.ibm.com
http://www-01.ibm.com/support/docview.wss?uid=isg400001843
CONFIRM
www-01.ibm.com
http://www-01.ibm.com/support/docview.wss?uid=isg400001841
CONFIRM
FEDORA-2014-9308
http://lists.fedoraproject.org/pipermail/package-announce/2014-August/136473.html
FEDORA
FEDORA-2014-9301
http://lists.fedoraproject.org/pipermail/package-announce/2014-August/136470.html
FEDORA

GET https://vulnerabilitydata.com/api/details/CVE-2013-4353

{
	"id": "CVE-2013-4353",
	"published_date": "2014-01-09T01:55Z",
	"last_modified_date": "2017-01-07T02:59Z",
	"assigner": "secalert@redhat.com",
	"description": "The ssl3_take_mac function in ssl/s3_both.c in OpenSSL 1.0.1 before 1.0.1f allows remote TLS servers to cause a denial of service (NULL pointer dereference and application crash) via a crafted Next Protocol Negotiation record in a TLS handshake.",
	"references": [
		{
			"url": "http://www.openssl.org/news/vulnerabilities.html",
			"name": "http://www.openssl.org/news/vulnerabilities.html",
			"refsource": "CONFIRM",
			"tags": [
				"Vendor Advisory"
			]
		},
		{
			"url": "http://git.openssl.org/gitweb/?p=openssl.git;a=blob_plain;f=CHANGES;hb=refs/heads/OpenSSL_1_0_1-stable",
			"name": "http://git.openssl.org/gitweb/?p=openssl.git;a=blob_plain;f=CHANGES;hb=refs/heads/OpenSSL_1_0_1-stable",
			"refsource": "CONFIRM",
			"tags": [
				"Vendor Advisory"
			]
		},
		{
			"url": "http://git.openssl.org/gitweb/?p=openssl.git;a=commit;h=197e0ea817ad64820789d86711d55ff50d71f631",
			"name": "http://git.openssl.org/gitweb/?p=openssl.git;a=commit;h=197e0ea817ad64820789d86711d55ff50d71f631",
			"refsource": "CONFIRM",
			"tags": []
		},
		{
			"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1049058",
			"name": "https://bugzilla.redhat.com/show_bug.cgi?id=1049058",
			"refsource": "CONFIRM",
			"tags": []
		},
		{
			"url": "http://rhn.redhat.com/errata/RHSA-2014-0015.html",
			"name": "RHSA-2014:0015",
			"refsource": "REDHAT",
			"tags": []
		},
		{
			"url": "http://www.ubuntu.com/usn/USN-2079-1",
			"name": "USN-2079-1",
			"refsource": "UBUNTU",
			"tags": []
		},
		{
			"url": "http://www.debian.org/security/2014/dsa-2837",
			"name": "DSA-2837",
			"refsource": "DEBIAN",
			"tags": []
		},
		{
			"url": "http://lists.opensuse.org/opensuse-updates/2014-01/msg00067.html",
			"name": "openSUSE-SU-2014:0096",
			"refsource": "SUSE",
			"tags": []
		},
		{
			"url": "http://rhn.redhat.com/errata/RHSA-2014-0041.html",
			"name": "RHSA-2014:0041",
			"refsource": "REDHAT",
			"tags": []
		},
		{
			"url": "http://lists.opensuse.org/opensuse-updates/2014-01/msg00065.html",
			"name": "openSUSE-SU-2014:0094",
			"refsource": "SUSE",
			"tags": []
		},
		{
			"url": "http://lists.opensuse.org/opensuse-updates/2014-01/msg00070.html",
			"name": "openSUSE-SU-2014:0099",
			"refsource": "SUSE",
			"tags": []
		},
		{
			"url": "http://www.splunk.com/view/SP-CAAAMB3",
			"name": "http://www.splunk.com/view/SP-CAAAMB3",
			"refsource": "CONFIRM",
			"tags": []
		},
		{
			"url": "http://www-01.ibm.com/support/docview.wss?uid=isg400001843",
			"name": "http://www-01.ibm.com/support/docview.wss?uid=isg400001843",
			"refsource": "CONFIRM",
			"tags": []
		},
		{
			"url": "http://www-01.ibm.com/support/docview.wss?uid=isg400001841",
			"name": "http://www-01.ibm.com/support/docview.wss?uid=isg400001841",
			"refsource": "CONFIRM",
			"tags": []
		},
		{
			"url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-August/136473.html",
			"name": "FEDORA-2014-9308",
			"refsource": "FEDORA",
			"tags": []
		},
		{
			"url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-August/136470.html",
			"name": "FEDORA-2014-9301",
			"refsource": "FEDORA",
			"tags": []
		}
	],
	"impact": {
		"baseMetricV2": {
			"cvssV2": {
				"version": "2.0",
				"vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
				"accessVector": "NETWORK",
				"accessComplexity": "MEDIUM",
				"authentication": "NONE",
				"confidentialityImpact": "NONE",
				"integrityImpact": "NONE",
				"availabilityImpact": "PARTIAL",
				"baseScore": 4.3
			},
			"severity": "MEDIUM",
			"exploitabilityScore": 8.6,
			"impactScore": 2.9,
			"obtainAllPrivilege": false,
			"obtainUserPrivilege": false,
			"obtainOtherPrivilege": false,
			"userInteractionRequired": false
		}
	},
	"problem_type": "CWE-20"
}