Dr. Henson,

Can you give me any information with regards to how the exploitation of 
CVE-2013-6450 against 0.9.8y may manifest itself?  If not a DoS, could it cause 
a process using libssl to core, cause libssl to return an "okay" when it should 
returned an error status, leak sensitive information, etc.?

Thanks.


----- Original Message -----
> Sent: Thursday, January 16, 2014 1:51 PM
> Subject: Re: CVE-2013-6450 and 0.9.8-line
> 
> Oh, okay.  Thank you for that tidbit.
> 
> If not a DoS, how does the issue manifest itself in 0.9.8 if an adversary 
> uses/attempts to use the flaw?
> 
> Thanks. 
> 
> 
> 
> ----- Original Message -----
>>  From: Dr. Stephen Henson <st...@openssl.org>
>>  To: openssl-users@openssl.org
>>  Cc: 
>>  Sent: Thursday, January 16, 2014 12:22 PM
>>  Subject: Re: CVE-2013-6450 and 0.9.8-line
>> 
>>  On Thu, Jan 16, 2014, no_spam...@yahoo.com wrote:
>> 
>> 
>>>   It is my understanding that 0.9.8y contains the DTLS retransmission 
> flaw
>>>   described in CVE-2013-6450.
>>> 
>> 
>>  It contains the flaw but it is not a DoS issue in 0.9.8.
>> 
>>  It's not a trivial fix for 0.9.8 because the DTLS record handling 
> changed in
>>  1.0.0.
>> 
>>  Steve.
______________________________________________________________________
OpenSSL Project                                 http://www.openssl.org
User Support Mailing List                    openssl-users@openssl.org
Automated List Manager                           majord...@openssl.org

Reply via email to