{"id":"CVE-2013-2125","details":"OpenSMTPD before 5.3.2 does not properly handle SSL sessions, which allows remote attackers to cause a denial of service (connection blocking) by keeping a connection open.","modified":"2026-04-10T03:44:25.823041Z","published":"2014-05-27T14:55:09Z","references":[{"type":"ADVISORY","url":"http://secunia.com/advisories/53353"},{"type":"EVIDENCE","url":"http://git.zx2c4.com/OpenSMTPD/commit/?id=38b26921bad5fe24ad747bf9d591330d683728b0"},{"type":"EVIDENCE","url":"http://seclists.org/oss-sec/2013/q2/362"},{"type":"FIX","url":"http://git.zx2c4.com/OpenSMTPD/commit/?id=38b26921bad5fe24ad747bf9d591330d683728b0"},{"type":"WEB","url":"http://osvdb.org/93495"},{"type":"WEB","url":"http://seclists.org/oss-sec/2013/q2/366"},{"type":"WEB","url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/84388"}],"schema_version":"1.7.5"}