First published: Sun Dec 01 2013(Updated: )
The HTTPSTK service in the novell-nrm package before 2.0.2-297.305.302.3 in Novell Open Enterprise Server 2 (OES 2) Linux, and OES 11 Linux Gold and SP1, does not make the intended SSL_free and SSL_shutdown calls for the close of a TCP connection, which allows remote attackers to cause a denial of service (service crash) by establishing many TCP connections to port 8009.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Micro Focus Open Enterprise Server | =11.0 | |
Micro Focus Open Enterprise Server | =11.0-sp1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2013-3707 is classified as a high-severity vulnerability due to its potential to allow remote attackers to cause a denial of service.
To mitigate CVE-2013-3707, it is recommended to update the novell-nrm package to version 2.0.2-297.305.302.3 or later.
CVE-2013-3707 affects Novell Open Enterprise Server 2 (OES 2) Linux and OES 11 Linux Gold and SP1 versions.
CVE-2013-3707 allows remote attackers to exploit the vulnerability to cause a denial of service by improperly managing TCP connections.
There are no known workarounds for CVE-2013-3707 other than applying the appropriate software updates.