CVE-2013-2052

Buffer overflow in the atodn function in libreswan 3.0 and 3.1, when Opportunistic Encryption is enabled and an RSA key is being used, allows remote attackers to cause a denial of service (pluto IKE daemon crash) and possibly execute arbitrary code via crafted DNS TXT records. NOTE: this might be the same vulnerability as CVE-2013-2053 and CVE-2013-2054.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:libreswan:libreswan:3.0:*:*:*:*:*:*:*
cpe:2.3:a:libreswan:libreswan:3.1:*:*:*:*:*:*:*

History

21 Nov 2024, 01:50

Type Values Removed Values Added
References () https://libreswan.org/security/CVE-2013-2052/CVE-2013-2052.txt - Patch, Vendor Advisory () https://libreswan.org/security/CVE-2013-2052/CVE-2013-2052.txt - Patch, Vendor Advisory
References () https://lists.libreswan.org/pipermail/swan-announce/2013/000003.html - Vendor Advisory () https://lists.libreswan.org/pipermail/swan-announce/2013/000003.html - Vendor Advisory

Information

Published : 2013-07-09 17:55

Updated : 2024-11-21 01:50


NVD link : CVE-2013-2052

Mitre link : CVE-2013-2052

CVE.ORG link : CVE-2013-2052


JSON object : View

Products Affected

libreswan

  • libreswan
CWE
CWE-119

Improper Restriction of Operations within the Bounds of a Memory Buffer