### [CVE-2013-6450](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6450) ![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) ![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen) ### Description The DTLS retransmission implementation in OpenSSL 1.0.0 before 1.0.0l and 1.0.1 before 1.0.1f does not properly maintain data structures for digest and encryption contexts, which might allow man-in-the-middle attackers to trigger the use of a different context and cause a denial of service (application crash) by interfering with packet delivery, related to ssl/d1_both.c and ssl/t1_enc.c. ### POC #### Reference - http://seclists.org/fulldisclosure/2014/Dec/23 - http://seclists.org/fulldisclosure/2014/Dec/23 - http://www-01.ibm.com/support/docview.wss?uid=isg400001841 - http://www-01.ibm.com/support/docview.wss?uid=isg400001841 - http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html - http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html - http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html - http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html - http://www.vmware.com/security/advisories/VMSA-2014-0012.html - http://www.vmware.com/security/advisories/VMSA-2014-0012.html #### Github - https://github.com/ARPSyndicate/cvemon - https://github.com/chnzzh/OpenSSL-CVE-lib