| { | |
| "idx": 0, | |
| "project": "openssl", | |
| "commit_id": "ca989269a2876bae79393bd54c3e72d49975fc75", | |
| "project_url": "https://github.com/openssl/openssl", | |
| "commit_url": "https://git.openssl.org/gitweb/?p=openssl.git;a=commit;h=ca989269a2876bae79393bd54c3e72d49975fc75", | |
| "commit_message": "Use version in SSL_METHOD not SSL structure.\n\nWhen deciding whether to use TLS 1.2 PRF and record hash algorithms\nuse the version number in the corresponding SSL_METHOD structure\ninstead of the SSL structure. The SSL structure version is sometimes\ninaccurate. Note: OpenSSL 1.0.2 and later effectively do this already.\n(CVE-2013-6449)", | |
| "target": 1, | |
| "func": " long ssl_get_algorithm2(SSL *s)\n {\n long alg2 = s->s3->tmp.new_cipher->algorithm2;\n if (TLS1_get_version(s) >= TLS1_2_VERSION &&\n alg2 == (SSL_HANDSHAKE_MAC_DEFAULT|TLS1_PRF))\n return SSL_HANDSHAKE_MAC_SHA256 | TLS1_PRF_SHA256;\n return alg2;\n\t}\n", | |
| "func_hash": 2.5508774765922695e+38, | |
| "file_name": "None", | |
| "file_hash": null, | |
| "cwe": [ | |
| "CWE-310" | |
| ], | |
| "cve": "CVE-2013-6449", | |
| "cve_desc": "The ssl_get_algorithm2 function in ssl/s3_lib.c in OpenSSL before 1.0.2 obtains a certain version number from an incorrect data structure, which allows remote attackers to cause a denial of service (daemon crash) via crafted traffic from a TLS 1.2 client.", | |
| "nvd_url": "https://nvd.nist.gov/vuln/detail/CVE-2013-6449" | |
| } | |
| { | |
| "idx": 157856, | |
| "project": "openssl", | |
| "commit_id": "ca989269a2876bae79393bd54c3e72d49975fc75", | |
| "project_url": "https://github.com/openssl/openssl", | |
| "commit_url": "https://git.openssl.org/gitweb/?p=openssl.git;a=commit;h=ca989269a2876bae79393bd54c3e72d49975fc75", | |
| "commit_message": "Use version in SSL_METHOD not SSL structure.\n\nWhen deciding whether to use TLS 1.2 PRF and record hash algorithms\nuse the version number in the corresponding SSL_METHOD structure\ninstead of the SSL structure. The SSL structure version is sometimes\ninaccurate. Note: OpenSSL 1.0.2 and later effectively do this already.\n(CVE-2013-6449)", | |
| "target": 0, | |
| "func": " long ssl_get_algorithm2(SSL *s)\n {\n long alg2 = s->s3->tmp.new_cipher->algorithm2;\n if (s->method->version == TLS1_2_VERSION &&\n alg2 == (SSL_HANDSHAKE_MAC_DEFAULT|TLS1_PRF))\n return SSL_HANDSHAKE_MAC_SHA256 | TLS1_PRF_SHA256;\n return alg2;\n\t}\n", | |
| "func_hash": 1.8544816833638957e+38, | |
| "file_name": "None", | |
| "file_hash": null, | |
| "cwe": [ | |
| "CWE-310" | |
| ], | |
| "cve": "CVE-2013-6449", | |
| "cve_desc": "The ssl_get_algorithm2 function in ssl/s3_lib.c in OpenSSL before 1.0.2 obtains a certain version number from an incorrect data structure, which allows remote attackers to cause a denial of service (daemon crash) via crafted traffic from a TLS 1.2 client.", | |
| "nvd_url": "https://nvd.nist.gov/vuln/detail/CVE-2013-6449" | |
| } |