CVE-2013-2053

CVE Details

Release Date:2013-05-13
Impact:Important What is this?

Description


Buffer overflow in the atodn function in Openswan before 2.6.39, when Opportunistic Encryption is enabled and an RSA key is being used, allows remote attackers to cause a denial of service (pluto IKE daemon crash) and possibly execute arbitrary code via crafted DNS TXT records. NOTE: this might be the same vulnerability as CVE-2013-2052 and CVE-2013-2054.

See more information about CVE-2013-2053 from MITRE CVE dictionary and NIST NVD


NOTE: The following CVSS metrics and score provided are preliminary and subject to review.


CVSS v2 metrics

Base Score: 7.6
Vector String: AV:N/AC:H/Au:N/C:C/I:C/A:C
Version: 2.0
Attack Vector: Network
Attack Complexity: High
Authentication: None
Confidentiality Impact: Complete
Integrity Impact: Complete
Availability Impact: Complete

Errata information


PlatformErrataRelease Date
Oracle Linux version 5 (openswan)ELSA-2013-08272013-05-15
Oracle Linux version 6 (openswan)ELSA-2013-08272013-05-15


This page is generated automatically and has not been checked for errors or omissions. For clarification or corrections:

software.hardware.complete