CVE-2013-4353
Severity CVSS v4.0:
Pending analysis
Type:
CWE-20
Input Validation
Publication date:
09/01/2014
Last modified:
11/04/2025
Description
The ssl3_take_mac function in ssl/s3_both.c in OpenSSL 1.0.1 before 1.0.1f allows remote TLS servers to cause a denial of service (NULL pointer dereference and application crash) via a crafted Next Protocol Negotiation record in a TLS handshake.
Impact
Base Score 2.0
4.30
Severity 2.0
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:a:openssl:openssl:1.0.1:*:*:*:*:*:*:* | ||
| cpe:2.3:a:openssl:openssl:1.0.1:beta1:*:*:*:*:*:* | ||
| cpe:2.3:a:openssl:openssl:1.0.1:beta2:*:*:*:*:*:* | ||
| cpe:2.3:a:openssl:openssl:1.0.1:beta3:*:*:*:*:*:* | ||
| cpe:2.3:a:openssl:openssl:1.0.1a:*:*:*:*:*:*:* | ||
| cpe:2.3:a:openssl:openssl:1.0.1b:*:*:*:*:*:*:* | ||
| cpe:2.3:a:openssl:openssl:1.0.1c:*:*:*:*:*:*:* | ||
| cpe:2.3:a:openssl:openssl:1.0.1d:*:*:*:*:*:*:* | ||
| cpe:2.3:a:openssl:openssl:1.0.1e:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://git.openssl.org/gitweb/?p=openssl.git%3Ba%3Dblob_plain%3Bf%3DCHANGES%3Bhb%3Drefs/heads/OpenSSL_1_0_1-stable
- http://git.openssl.org/gitweb/?p=openssl.git%3Ba%3Dcommit%3Bh%3D197e0ea817ad64820789d86711d55ff50d71f631
- http://lists.fedoraproject.org/pipermail/package-announce/2014-August/136470.html
- http://lists.fedoraproject.org/pipermail/package-announce/2014-August/136473.html
- http://lists.opensuse.org/opensuse-updates/2014-01/msg00065.html
- http://lists.opensuse.org/opensuse-updates/2014-01/msg00067.html
- http://lists.opensuse.org/opensuse-updates/2014-01/msg00070.html
- http://rhn.redhat.com/errata/RHSA-2014-0015.html
- http://rhn.redhat.com/errata/RHSA-2014-0041.html
- http://www-01.ibm.com/support/docview.wss?uid=isg400001841
- http://www-01.ibm.com/support/docview.wss?uid=isg400001843
- http://www.debian.org/security/2014/dsa-2837
- http://www.openssl.org/news/vulnerabilities.html
- http://www.splunk.com/view/SP-CAAAMB3
- http://www.ubuntu.com/usn/USN-2079-1
- https://bugzilla.redhat.com/show_bug.cgi?id=1049058
- http://git.openssl.org/gitweb/?p=openssl.git%3Ba%3Dblob_plain%3Bf%3DCHANGES%3Bhb%3Drefs/heads/OpenSSL_1_0_1-stable
- http://git.openssl.org/gitweb/?p=openssl.git%3Ba%3Dcommit%3Bh%3D197e0ea817ad64820789d86711d55ff50d71f631
- http://lists.fedoraproject.org/pipermail/package-announce/2014-August/136470.html
- http://lists.fedoraproject.org/pipermail/package-announce/2014-August/136473.html
- http://lists.opensuse.org/opensuse-updates/2014-01/msg00065.html
- http://lists.opensuse.org/opensuse-updates/2014-01/msg00067.html
- http://lists.opensuse.org/opensuse-updates/2014-01/msg00070.html
- http://rhn.redhat.com/errata/RHSA-2014-0015.html
- http://rhn.redhat.com/errata/RHSA-2014-0041.html
- http://www-01.ibm.com/support/docview.wss?uid=isg400001841
- http://www-01.ibm.com/support/docview.wss?uid=isg400001843
- http://www.debian.org/security/2014/dsa-2837
- http://www.openssl.org/news/vulnerabilities.html
- http://www.splunk.com/view/SP-CAAAMB3
- http://www.ubuntu.com/usn/USN-2079-1
- https://bugzilla.redhat.com/show_bug.cgi?id=1049058



