ID CVE-2013-2125
Summary OpenSMTPD before 5.3.2 does not properly handle SSL sessions, which allows remote attackers to cause a denial of service (connection blocking) by keeping a connection open.
References
Vulnerable Configurations
  • cpe:2.3:a:openbsd:opensmtpd:5.3.1:*:*:*:*:*:*:*
    cpe:2.3:a:openbsd:opensmtpd:5.3.1:*:*:*:*:*:*:*
CVSS
Base: 5.0 (as of 29-08-2017 - 01:33)
Impact:
Exploitability:
CWE CWE-310
CAPEC
  • Signature Spoofing by Key Recreation
    An attacker obtains an authoritative or reputable signer's private signature key by exploiting a cryptographic weakness in the signature algorithm or pseudorandom number generation and then uses this key to forge signatures from the original signer to mislead a victim into performing actions that benefit the attacker.
Access
VectorComplexityAuthentication
NETWORK LOW NONE
Impact
ConfidentialityIntegrityAvailability
NONE NONE PARTIAL
cvss-vector via4 AV:N/AC:L/Au:N/C:N/I:N/A:P
refmap via4
confirm http://git.zx2c4.com/OpenSMTPD/commit/?id=38b26921bad5fe24ad747bf9d591330d683728b0
mlist
  • [oss-security] 20130518 CVE Request: DoS in OpenSMTPD TLS Support
  • [oss-security] 20130518 Re: Re: CVE Request: DoS in OpenSMTPD TLS Support
osvdb 93495
secunia 53353
xf opensmtpd-cve20132125-dos(84388)
Last major update 29-08-2017 - 01:33
Published 27-05-2014 - 14:55
Last modified 29-08-2017 - 01:33
Back to Top