|
{ |
|
"idx": 0, |
|
"project": "openssl", |
|
"commit_id": "ca989269a2876bae79393bd54c3e72d49975fc75", |
|
"project_url": "https://github.com/openssl/openssl", |
|
"commit_url": "https://git.openssl.org/gitweb/?p=openssl.git;a=commit;h=ca989269a2876bae79393bd54c3e72d49975fc75", |
|
"commit_message": "Use version in SSL_METHOD not SSL structure.\n\nWhen deciding whether to use TLS 1.2 PRF and record hash algorithms\nuse the version number in the corresponding SSL_METHOD structure\ninstead of the SSL structure. The SSL structure version is sometimes\ninaccurate. Note: OpenSSL 1.0.2 and later effectively do this already.\n(CVE-2013-6449)", |
|
"target": 1, |
|
"func": " long ssl_get_algorithm2(SSL *s)\n {\n long alg2 = s->s3->tmp.new_cipher->algorithm2;\n if (TLS1_get_version(s) >= TLS1_2_VERSION &&\n alg2 == (SSL_HANDSHAKE_MAC_DEFAULT|TLS1_PRF))\n return SSL_HANDSHAKE_MAC_SHA256 | TLS1_PRF_SHA256;\n return alg2;\n\t}\n", |
|
"func_hash": 2.5508774765922695e+38, |
|
"file_name": "None", |
|
"file_hash": null, |
|
"cwe": [ |
|
"CWE-310" |
|
], |
|
"cve": "CVE-2013-6449", |
|
"cve_desc": "The ssl_get_algorithm2 function in ssl/s3_lib.c in OpenSSL before 1.0.2 obtains a certain version number from an incorrect data structure, which allows remote attackers to cause a denial of service (daemon crash) via crafted traffic from a TLS 1.2 client.", |
|
"nvd_url": "https://nvd.nist.gov/vuln/detail/CVE-2013-6449" |
|
} |
|
{ |
|
"idx": 157856, |
|
"project": "openssl", |
|
"commit_id": "ca989269a2876bae79393bd54c3e72d49975fc75", |
|
"project_url": "https://github.com/openssl/openssl", |
|
"commit_url": "https://git.openssl.org/gitweb/?p=openssl.git;a=commit;h=ca989269a2876bae79393bd54c3e72d49975fc75", |
|
"commit_message": "Use version in SSL_METHOD not SSL structure.\n\nWhen deciding whether to use TLS 1.2 PRF and record hash algorithms\nuse the version number in the corresponding SSL_METHOD structure\ninstead of the SSL structure. The SSL structure version is sometimes\ninaccurate. Note: OpenSSL 1.0.2 and later effectively do this already.\n(CVE-2013-6449)", |
|
"target": 0, |
|
"func": " long ssl_get_algorithm2(SSL *s)\n {\n long alg2 = s->s3->tmp.new_cipher->algorithm2;\n if (s->method->version == TLS1_2_VERSION &&\n alg2 == (SSL_HANDSHAKE_MAC_DEFAULT|TLS1_PRF))\n return SSL_HANDSHAKE_MAC_SHA256 | TLS1_PRF_SHA256;\n return alg2;\n\t}\n", |
|
"func_hash": 1.8544816833638957e+38, |
|
"file_name": "None", |
|
"file_hash": null, |
|
"cwe": [ |
|
"CWE-310" |
|
], |
|
"cve": "CVE-2013-6449", |
|
"cve_desc": "The ssl_get_algorithm2 function in ssl/s3_lib.c in OpenSSL before 1.0.2 obtains a certain version number from an incorrect data structure, which allows remote attackers to cause a denial of service (daemon crash) via crafted traffic from a TLS 1.2 client.", |
|
"nvd_url": "https://nvd.nist.gov/vuln/detail/CVE-2013-6449" |
|
} |