CVE-2013-2053

Buffer overflow in the atodn function in Openswan before 2.6.39, when Opportunistic Encryption is enabled and an RSA key is being used, allows remote attackers to cause a denial of service (pluto IKE daemon crash) and possibly execute arbitrary code via crafted DNS TXT records. NOTE: this might be the same vulnerability as CVE-2013-2052 and CVE-2013-2054.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:xelerance:openswan:*:*:*:*:*:*:*:*
cpe:2.3:a:xelerance:openswan:2.6.01:*:*:*:*:*:*:*
cpe:2.3:a:xelerance:openswan:2.6.02:*:*:*:*:*:*:*
cpe:2.3:a:xelerance:openswan:2.6.03:*:*:*:*:*:*:*
cpe:2.3:a:xelerance:openswan:2.6.04:*:*:*:*:*:*:*
cpe:2.3:a:xelerance:openswan:2.6.05:*:*:*:*:*:*:*
cpe:2.3:a:xelerance:openswan:2.6.06:*:*:*:*:*:*:*
cpe:2.3:a:xelerance:openswan:2.6.07:*:*:*:*:*:*:*
cpe:2.3:a:xelerance:openswan:2.6.08:*:*:*:*:*:*:*
cpe:2.3:a:xelerance:openswan:2.6.09:*:*:*:*:*:*:*
cpe:2.3:a:xelerance:openswan:2.6.10:*:*:*:*:*:*:*
cpe:2.3:a:xelerance:openswan:2.6.11:*:*:*:*:*:*:*
cpe:2.3:a:xelerance:openswan:2.6.12:*:*:*:*:*:*:*
cpe:2.3:a:xelerance:openswan:2.6.13:*:*:*:*:*:*:*
cpe:2.3:a:xelerance:openswan:2.6.14:*:*:*:*:*:*:*
cpe:2.3:a:xelerance:openswan:2.6.15:*:*:*:*:*:*:*
cpe:2.3:a:xelerance:openswan:2.6.16:*:*:*:*:*:*:*
cpe:2.3:a:xelerance:openswan:2.6.17:*:*:*:*:*:*:*
cpe:2.3:a:xelerance:openswan:2.6.18:*:*:*:*:*:*:*
cpe:2.3:a:xelerance:openswan:2.6.19:*:*:*:*:*:*:*
cpe:2.3:a:xelerance:openswan:2.6.20:*:*:*:*:*:*:*
cpe:2.3:a:xelerance:openswan:2.6.21:*:*:*:*:*:*:*
cpe:2.3:a:xelerance:openswan:2.6.22:*:*:*:*:*:*:*
cpe:2.3:a:xelerance:openswan:2.6.23:*:*:*:*:*:*:*
cpe:2.3:a:xelerance:openswan:2.6.24:*:*:*:*:*:*:*
cpe:2.3:a:xelerance:openswan:2.6.25:*:*:*:*:*:*:*
cpe:2.3:a:xelerance:openswan:2.6.26:*:*:*:*:*:*:*
cpe:2.3:a:xelerance:openswan:2.6.27:*:*:*:*:*:*:*
cpe:2.3:a:xelerance:openswan:2.6.28:*:*:*:*:*:*:*
cpe:2.3:a:xelerance:openswan:2.6.29:*:*:*:*:*:*:*
cpe:2.3:a:xelerance:openswan:2.6.30:*:*:*:*:*:*:*
cpe:2.3:a:xelerance:openswan:2.6.31:*:*:*:*:*:*:*
cpe:2.3:a:xelerance:openswan:2.6.32:*:*:*:*:*:*:*
cpe:2.3:a:xelerance:openswan:2.6.33:*:*:*:*:*:*:*
cpe:2.3:a:xelerance:openswan:2.6.34:*:*:*:*:*:*:*
cpe:2.3:a:xelerance:openswan:2.6.35:*:*:*:*:*:*:*
cpe:2.3:a:xelerance:openswan:2.6.36:*:*:*:*:*:*:*
cpe:2.3:a:xelerance:openswan:2.6.37:*:*:*:*:*:*:*

History

21 Nov 2024, 01:50

Type Values Removed Values Added
References () http://lists.opensuse.org/opensuse-security-announce/2013-07/msg00008.html - () http://lists.opensuse.org/opensuse-security-announce/2013-07/msg00008.html -
References () http://rhn.redhat.com/errata/RHSA-2013-0827.html - () http://rhn.redhat.com/errata/RHSA-2013-0827.html -
References () http://www.debian.org/security/2014/dsa-2893 - () http://www.debian.org/security/2014/dsa-2893 -
References () http://www.securityfocus.com/bid/59838 - () http://www.securityfocus.com/bid/59838 -
References () https://bugzilla.redhat.com/show_bug.cgi?id=960229 - () https://bugzilla.redhat.com/show_bug.cgi?id=960229 -
References () https://lists.libreswan.org/pipermail/swan-announce/2013/000003.html - () https://lists.libreswan.org/pipermail/swan-announce/2013/000003.html -
References () https://www.openswan.org/news/13 - Vendor Advisory () https://www.openswan.org/news/13 - Vendor Advisory

Information

Published : 2013-07-09 17:55

Updated : 2025-04-11 00:51


NVD link : CVE-2013-2053

Mitre link : CVE-2013-2053

CVE.ORG link : CVE-2013-2053


JSON object : View

Products Affected

xelerance

  • openswan
CWE
CWE-119

Improper Restriction of Operations within the Bounds of a Memory Buffer