CVE-2013-4550
Published Dec 24, 2013
Last updated 11 years ago
Overview
- Description
- Bip before 0.8.9, when running as a daemon, writes SSL handshake errors to an unexpected file descriptor that was previously associated with stderr before stderr has been closed, which allows remote attackers to write to other sockets and have an unspecified impact via a failed SSL handshake, a different vulnerability than CVE-2011-5268. NOTE: some sources originally mapped this CVE to two different types of issues; this CVE has since been SPLIT, producing CVE-2011-5268.
- Source
- secalert@redhat.com
- NVD status
- Modified
Risk scores
CVSS 2.0
- Type
- Primary
- Base score
- 5.1
- Impact score
- 6.4
- Exploitability score
- 4.9
- Vector string
- AV:N/AC:H/Au:N/C:P/I:P/A:P
Weaknesses
- nvd@nist.gov
- CWE-310
Social media
- Hype score
- Not currently trending
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:o:fedoraproject:fedora:18:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E14271AE-1309-48F3-B9C6-D7DEEC488279" }, { "criteria": "cpe:2.3:o:fedoraproject:fedora:19:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "5991814D-CA77-4C25-90D2-DB542B17E0AD" }, { "criteria": "cpe:2.3:o:fedoraproject:fedora:20:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "FF47C9F0-D8DA-4B55-89EB-9B2C9383ADB9" } ], "operator": "OR" } ] }, { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:duckcorp:bip:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "8C9CD8E7-1C90-4C97-BFA1-E958F28D7205", "versionEndIncluding": "0.8.8" }, { "criteria": "cpe:2.3:a:duckcorp:bip:0.8.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "103DE389-B058-4BCA-8D32-B3932B337CE3" }, { "criteria": "cpe:2.3:a:duckcorp:bip:0.8.0:rc0:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "832D9196-6078-4692-8C99-2B812F1B7A6B" }, { "criteria": "cpe:2.3:a:duckcorp:bip:0.8.0:rc1:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "CDCBFD04-18FB-4999-93DE-DD8E770259A7" }, { "criteria": "cpe:2.3:a:duckcorp:bip:0.8.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "02E8797D-D076-4A8C-9016-419F85146BE0" }, { "criteria": "cpe:2.3:a:duckcorp:bip:0.8.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "066B0061-0574-4946-BFAA-206DBC9D59DA" }, { "criteria": "cpe:2.3:a:duckcorp:bip:0.8.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "16AD459B-CE0E-44B3-8359-3D30F598F78A" }, { "criteria": "cpe:2.3:a:duckcorp:bip:0.8.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "ECE5E182-95E5-4A8C-BD64-C383A7B74CA2" }, { "criteria": "cpe:2.3:a:duckcorp:bip:0.8.5:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "AAE02BCA-B9D4-43B4-BE90-81408E574A2F" }, { "criteria": "cpe:2.3:a:duckcorp:bip:0.8.6:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "470BD85F-F64E-4EF1-8130-5718193A36E1" }, { "criteria": "cpe:2.3:a:duckcorp:bip:0.8.7:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "116F5B46-6653-400F-9862-80F30BC5C7BB" } ], "operator": "OR" } ] } ]