First published: Mon Jan 06 2014(Updated: )
A flaw was found in the way OpenSSL handled TLS handshakes. A carefully crafted invalid TLS handshake could crash OpenSSL with a NULL pointer exception. This flaw only affects OpenSSL versions 1.0.1 through 1.0.1e; earlier versions are not affected and this is corrected in upstream version 1.0.1f [1],[2]. [1] <a href="http://www.openssl.org/news/vulnerabilities.html#2013-4353">http://www.openssl.org/news/vulnerabilities.html#2013-4353</a> [2] <a href="http://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=197e0ea817ad64820789d86711d55ff50d71f631">http://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=197e0ea817ad64820789d86711d55ff50d71f631</a>
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/openssl | <1.0.1 | 1.0.1 |
OpenSSL libcrypto | =1.0.1 | |
OpenSSL libcrypto | =1.0.1-beta1 | |
OpenSSL libcrypto | =1.0.1-beta2 | |
OpenSSL libcrypto | =1.0.1-beta3 | |
OpenSSL libcrypto | =1.0.1a | |
OpenSSL libcrypto | =1.0.1b | |
OpenSSL libcrypto | =1.0.1c | |
OpenSSL libcrypto | =1.0.1d | |
OpenSSL libcrypto | =1.0.1e |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2013-4353 is categorized as a medium severity vulnerability due to the potential for denial of service caused by a NULL pointer exception during TLS handshakes.
To fix CVE-2013-4353, upgrade OpenSSL to version 1.0.1f or later.
CVE-2013-4353 affects OpenSSL versions 1.0.1 through 1.0.1e.
CVE-2013-4353 is a denial of service vulnerability associated with improper handling during TLS handshakes.
There are no effective workarounds for CVE-2013-4353; upgrading to the fixed version is recommended.