Search for vulnerabilities
Vulnerability details: VCID-3gg9-vwsk-aaab
Vulnerability ID VCID-3gg9-vwsk-aaab
Aliases CVE-2013-4623
Summary The x509parse_crt function in x509.h in PolarSSL 1.1.x before 1.1.7 and 1.2.x before 1.2.8 does not properly parse certificate messages during the SSL/TLS handshake, which allows remote attackers to cause a denial of service (infinite loop and CPU consumption) via a certificate message that contains a PEM encoded certificate.
Status Published
Exploitability 0.5
Weighted Severity 6.2
Risk 3.1
Affected and Fixed Packages Package Details
Weaknesses (1)
System Score Found at
generic_textual Medium http://people.canonical.com/~ubuntu-security/cve/2013/CVE-2013-4623.html
epss 0.00659 https://api.first.org/data/v1/epss?cve=CVE-2013-4623
epss 0.00659 https://api.first.org/data/v1/epss?cve=CVE-2013-4623
epss 0.00659 https://api.first.org/data/v1/epss?cve=CVE-2013-4623
epss 0.00659 https://api.first.org/data/v1/epss?cve=CVE-2013-4623
epss 0.00659 https://api.first.org/data/v1/epss?cve=CVE-2013-4623
epss 0.00659 https://api.first.org/data/v1/epss?cve=CVE-2013-4623
epss 0.00659 https://api.first.org/data/v1/epss?cve=CVE-2013-4623
epss 0.00659 https://api.first.org/data/v1/epss?cve=CVE-2013-4623
epss 0.00659 https://api.first.org/data/v1/epss?cve=CVE-2013-4623
epss 0.00659 https://api.first.org/data/v1/epss?cve=CVE-2013-4623
epss 0.00659 https://api.first.org/data/v1/epss?cve=CVE-2013-4623
epss 0.00659 https://api.first.org/data/v1/epss?cve=CVE-2013-4623
epss 0.00659 https://api.first.org/data/v1/epss?cve=CVE-2013-4623
epss 0.00659 https://api.first.org/data/v1/epss?cve=CVE-2013-4623
epss 0.00659 https://api.first.org/data/v1/epss?cve=CVE-2013-4623
epss 0.00659 https://api.first.org/data/v1/epss?cve=CVE-2013-4623
epss 0.00659 https://api.first.org/data/v1/epss?cve=CVE-2013-4623
epss 0.00659 https://api.first.org/data/v1/epss?cve=CVE-2013-4623
epss 0.00659 https://api.first.org/data/v1/epss?cve=CVE-2013-4623
epss 0.00659 https://api.first.org/data/v1/epss?cve=CVE-2013-4623
epss 0.00659 https://api.first.org/data/v1/epss?cve=CVE-2013-4623
epss 0.00659 https://api.first.org/data/v1/epss?cve=CVE-2013-4623
epss 0.00659 https://api.first.org/data/v1/epss?cve=CVE-2013-4623
epss 0.00659 https://api.first.org/data/v1/epss?cve=CVE-2013-4623
epss 0.00659 https://api.first.org/data/v1/epss?cve=CVE-2013-4623
epss 0.00659 https://api.first.org/data/v1/epss?cve=CVE-2013-4623
epss 0.00659 https://api.first.org/data/v1/epss?cve=CVE-2013-4623
epss 0.00659 https://api.first.org/data/v1/epss?cve=CVE-2013-4623
epss 0.00659 https://api.first.org/data/v1/epss?cve=CVE-2013-4623
epss 0.00659 https://api.first.org/data/v1/epss?cve=CVE-2013-4623
epss 0.00659 https://api.first.org/data/v1/epss?cve=CVE-2013-4623
epss 0.00659 https://api.first.org/data/v1/epss?cve=CVE-2013-4623
epss 0.00659 https://api.first.org/data/v1/epss?cve=CVE-2013-4623
epss 0.00659 https://api.first.org/data/v1/epss?cve=CVE-2013-4623
epss 0.00659 https://api.first.org/data/v1/epss?cve=CVE-2013-4623
epss 0.00659 https://api.first.org/data/v1/epss?cve=CVE-2013-4623
epss 0.00659 https://api.first.org/data/v1/epss?cve=CVE-2013-4623
epss 0.00659 https://api.first.org/data/v1/epss?cve=CVE-2013-4623
epss 0.00659 https://api.first.org/data/v1/epss?cve=CVE-2013-4623
epss 0.00659 https://api.first.org/data/v1/epss?cve=CVE-2013-4623
epss 0.00659 https://api.first.org/data/v1/epss?cve=CVE-2013-4623
epss 0.00659 https://api.first.org/data/v1/epss?cve=CVE-2013-4623
epss 0.00659 https://api.first.org/data/v1/epss?cve=CVE-2013-4623
epss 0.00659 https://api.first.org/data/v1/epss?cve=CVE-2013-4623
epss 0.00659 https://api.first.org/data/v1/epss?cve=CVE-2013-4623
epss 0.00659 https://api.first.org/data/v1/epss?cve=CVE-2013-4623
epss 0.00659 https://api.first.org/data/v1/epss?cve=CVE-2013-4623
epss 0.00659 https://api.first.org/data/v1/epss?cve=CVE-2013-4623
epss 0.00659 https://api.first.org/data/v1/epss?cve=CVE-2013-4623
epss 0.00659 https://api.first.org/data/v1/epss?cve=CVE-2013-4623
epss 0.00659 https://api.first.org/data/v1/epss?cve=CVE-2013-4623
epss 0.00659 https://api.first.org/data/v1/epss?cve=CVE-2013-4623
epss 0.00659 https://api.first.org/data/v1/epss?cve=CVE-2013-4623
epss 0.00659 https://api.first.org/data/v1/epss?cve=CVE-2013-4623
epss 0.00659 https://api.first.org/data/v1/epss?cve=CVE-2013-4623
epss 0.00659 https://api.first.org/data/v1/epss?cve=CVE-2013-4623
epss 0.00659 https://api.first.org/data/v1/epss?cve=CVE-2013-4623
epss 0.00659 https://api.first.org/data/v1/epss?cve=CVE-2013-4623
epss 0.00659 https://api.first.org/data/v1/epss?cve=CVE-2013-4623
epss 0.00659 https://api.first.org/data/v1/epss?cve=CVE-2013-4623
epss 0.00659 https://api.first.org/data/v1/epss?cve=CVE-2013-4623
epss 0.00659 https://api.first.org/data/v1/epss?cve=CVE-2013-4623
epss 0.00659 https://api.first.org/data/v1/epss?cve=CVE-2013-4623
epss 0.00659 https://api.first.org/data/v1/epss?cve=CVE-2013-4623
epss 0.00659 https://api.first.org/data/v1/epss?cve=CVE-2013-4623
epss 0.0123 https://api.first.org/data/v1/epss?cve=CVE-2013-4623
epss 0.04740 https://api.first.org/data/v1/epss?cve=CVE-2013-4623
epss 0.04740 https://api.first.org/data/v1/epss?cve=CVE-2013-4623
epss 0.04740 https://api.first.org/data/v1/epss?cve=CVE-2013-4623
epss 0.04740 https://api.first.org/data/v1/epss?cve=CVE-2013-4623
epss 0.04740 https://api.first.org/data/v1/epss?cve=CVE-2013-4623
epss 0.04740 https://api.first.org/data/v1/epss?cve=CVE-2013-4623
epss 0.04740 https://api.first.org/data/v1/epss?cve=CVE-2013-4623
epss 0.04740 https://api.first.org/data/v1/epss?cve=CVE-2013-4623
epss 0.04740 https://api.first.org/data/v1/epss?cve=CVE-2013-4623
epss 0.06325 https://api.first.org/data/v1/epss?cve=CVE-2013-4623
epss 0.06325 https://api.first.org/data/v1/epss?cve=CVE-2013-4623
epss 0.06325 https://api.first.org/data/v1/epss?cve=CVE-2013-4623
epss 0.06325 https://api.first.org/data/v1/epss?cve=CVE-2013-4623
generic_textual Medium https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4623
generic_textual Medium https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5914
generic_textual Medium https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5915
cvssv2 4.3 https://nvd.nist.gov/vuln/detail/CVE-2013-4623
generic_textual Medium https://polarssl.org/tech-updates/security-advisories/polarssl-security-advisory-2013-03
Reference id Reference type URL
http://lists.fedoraproject.org/pipermail/package-announce/2013-September/115922.html
http://lists.fedoraproject.org/pipermail/package-announce/2013-September/115927.html
http://lists.fedoraproject.org/pipermail/package-announce/2013-September/116351.html
http://people.canonical.com/~ubuntu-security/cve/2013/CVE-2013-4623.html
https://api.first.org/data/v1/epss?cve=CVE-2013-4623
https://bugzilla.redhat.com/show_bug.cgi?id=997767
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4623
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5914
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5915
https://github.com/polarssl/polarssl/commit/1922a4e6aade7b1d685af19d4d9339ddb5c02859
https://polarssl.org/tech-updates/security-advisories/polarssl-security-advisory-2013-03
http://www.debian.org/security/2013/dsa-2782
http://www.securityfocus.com/bid/61764
cpe:2.3:a:polarssl:polarssl:1.1.0:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:polarssl:polarssl:1.1.0:*:*:*:*:*:*:*
cpe:2.3:a:polarssl:polarssl:1.1.0:rc0:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:polarssl:polarssl:1.1.0:rc0:*:*:*:*:*:*
cpe:2.3:a:polarssl:polarssl:1.1.0:rc1:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:polarssl:polarssl:1.1.0:rc1:*:*:*:*:*:*
cpe:2.3:a:polarssl:polarssl:1.1.1:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:polarssl:polarssl:1.1.1:*:*:*:*:*:*:*
cpe:2.3:a:polarssl:polarssl:1.1.2:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:polarssl:polarssl:1.1.2:*:*:*:*:*:*:*
cpe:2.3:a:polarssl:polarssl:1.1.3:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:polarssl:polarssl:1.1.3:*:*:*:*:*:*:*
cpe:2.3:a:polarssl:polarssl:1.1.4:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:polarssl:polarssl:1.1.4:*:*:*:*:*:*:*
cpe:2.3:a:polarssl:polarssl:1.1.5:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:polarssl:polarssl:1.1.5:*:*:*:*:*:*:*
cpe:2.3:a:polarssl:polarssl:1.1.6:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:polarssl:polarssl:1.1.6:*:*:*:*:*:*:*
cpe:2.3:a:polarssl:polarssl:1.2.0:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:polarssl:polarssl:1.2.0:*:*:*:*:*:*:*
cpe:2.3:a:polarssl:polarssl:1.2.1:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:polarssl:polarssl:1.2.1:*:*:*:*:*:*:*
cpe:2.3:a:polarssl:polarssl:1.2.2:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:polarssl:polarssl:1.2.2:*:*:*:*:*:*:*
cpe:2.3:a:polarssl:polarssl:1.2.3:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:polarssl:polarssl:1.2.3:*:*:*:*:*:*:*
cpe:2.3:a:polarssl:polarssl:1.2.4:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:polarssl:polarssl:1.2.4:*:*:*:*:*:*:*
cpe:2.3:a:polarssl:polarssl:1.2.5:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:polarssl:polarssl:1.2.5:*:*:*:*:*:*:*
cpe:2.3:a:polarssl:polarssl:1.2.6:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:polarssl:polarssl:1.2.6:*:*:*:*:*:*:*
cpe:2.3:a:polarssl:polarssl:1.2.7:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:polarssl:polarssl:1.2.7:*:*:*:*:*:*:*
CVE-2013-4623 https://nvd.nist.gov/vuln/detail/CVE-2013-4623
GLSA-201310-10 https://security.gentoo.org/glsa/201310-10
No exploits are available.
Vector: AV:N/AC:M/Au:N/C:N/I:N/A:P Found at https://nvd.nist.gov/vuln/detail/CVE-2013-4623
Exploitability (E) Access Vector (AV) Access Complexity (AC) Authentication (Au) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

high

functional

unproven

proof_of_concept

not_defined

local

adjacent_network

network

high

medium

low

multiple

single

none

none

partial

complete

none

partial

complete

none

partial

complete

Exploit Prediction Scoring System (EPSS)
Percentile 0.68711
EPSS Score 0.00659
Published At March 28, 2025, 12:55 p.m.
Date Actor Action Source VulnerableCode Version
There are no relevant records.