CVE-2013-2054

Buffer overflow in the atodn function in strongSwan 2.0.0 through 4.3.4, when Opportunistic Encryption is enabled and an RSA key is being used, allows remote attackers to cause a denial of service (pluto IKE daemon crash) and possibly execute arbitrary code via crafted DNS TXT records. NOTE: this might be the same vulnerability as CVE-2013-2053 and CVE-2013-2054.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:strongswan:strongswan:2.0.0:*:*:*:*:*:*:*
cpe:2.3:a:strongswan:strongswan:2.0.1:*:*:*:*:*:*:*
cpe:2.3:a:strongswan:strongswan:2.0.2:*:*:*:*:*:*:*
cpe:2.3:a:strongswan:strongswan:2.1.0:*:*:*:*:*:*:*
cpe:2.3:a:strongswan:strongswan:2.1.1:*:*:*:*:*:*:*
cpe:2.3:a:strongswan:strongswan:2.1.2:*:*:*:*:*:*:*
cpe:2.3:a:strongswan:strongswan:2.1.3:*:*:*:*:*:*:*
cpe:2.3:a:strongswan:strongswan:2.1.4:*:*:*:*:*:*:*
cpe:2.3:a:strongswan:strongswan:2.1.5:*:*:*:*:*:*:*
cpe:2.3:a:strongswan:strongswan:2.3.0:*:*:*:*:*:*:*
cpe:2.3:a:strongswan:strongswan:2.3.1:*:*:*:*:*:*:*
cpe:2.3:a:strongswan:strongswan:2.3.2:*:*:*:*:*:*:*
cpe:2.3:a:strongswan:strongswan:2.4:*:*:*:*:*:*:*
cpe:2.3:a:strongswan:strongswan:2.4.0:*:*:*:*:*:*:*
cpe:2.3:a:strongswan:strongswan:2.4.0a:*:*:*:*:*:*:*
cpe:2.3:a:strongswan:strongswan:2.4.1:*:*:*:*:*:*:*
cpe:2.3:a:strongswan:strongswan:2.4.2:*:*:*:*:*:*:*
cpe:2.3:a:strongswan:strongswan:2.4.3:*:*:*:*:*:*:*
cpe:2.3:a:strongswan:strongswan:2.4.4:*:*:*:*:*:*:*
cpe:2.3:a:strongswan:strongswan:2.5.0:*:*:*:*:*:*:*
cpe:2.3:a:strongswan:strongswan:2.5.1:*:*:*:*:*:*:*
cpe:2.3:a:strongswan:strongswan:2.5.2:*:*:*:*:*:*:*
cpe:2.3:a:strongswan:strongswan:2.5.3:*:*:*:*:*:*:*
cpe:2.3:a:strongswan:strongswan:2.5.4:*:*:*:*:*:*:*
cpe:2.3:a:strongswan:strongswan:2.5.5:*:*:*:*:*:*:*
cpe:2.3:a:strongswan:strongswan:2.5.6:*:*:*:*:*:*:*
cpe:2.3:a:strongswan:strongswan:2.5.7:*:*:*:*:*:*:*
cpe:2.3:a:strongswan:strongswan:2.6:*:*:*:*:*:*:*
cpe:2.3:a:strongswan:strongswan:2.6.0:*:*:*:*:*:*:*
cpe:2.3:a:strongswan:strongswan:2.6.1:*:*:*:*:*:*:*
cpe:2.3:a:strongswan:strongswan:2.6.2:*:*:*:*:*:*:*
cpe:2.3:a:strongswan:strongswan:2.6.3:*:*:*:*:*:*:*
cpe:2.3:a:strongswan:strongswan:2.6.4:*:*:*:*:*:*:*
cpe:2.3:a:strongswan:strongswan:2.6.14:*:*:*:*:*:*:*
cpe:2.3:a:strongswan:strongswan:2.6.16:*:*:*:*:*:*:*
cpe:2.3:a:strongswan:strongswan:2.6.20:*:*:*:*:*:*:*
cpe:2.3:a:strongswan:strongswan:2.6.21:*:*:*:*:*:*:*
cpe:2.3:a:strongswan:strongswan:2.7.0:*:*:*:*:*:*:*
cpe:2.3:a:strongswan:strongswan:2.7.1:*:*:*:*:*:*:*
cpe:2.3:a:strongswan:strongswan:2.7.2:*:*:*:*:*:*:*
cpe:2.3:a:strongswan:strongswan:2.7.3:*:*:*:*:*:*:*
cpe:2.3:a:strongswan:strongswan:2.8.0:*:*:*:*:*:*:*
cpe:2.3:a:strongswan:strongswan:2.8.1:*:*:*:*:*:*:*
cpe:2.3:a:strongswan:strongswan:2.8.2:*:*:*:*:*:*:*
cpe:2.3:a:strongswan:strongswan:2.8.3:*:*:*:*:*:*:*
cpe:2.3:a:strongswan:strongswan:2.8.4:*:*:*:*:*:*:*
cpe:2.3:a:strongswan:strongswan:2.8.5:*:*:*:*:*:*:*
cpe:2.3:a:strongswan:strongswan:2.8.6:*:*:*:*:*:*:*
cpe:2.3:a:strongswan:strongswan:2.8.7:*:*:*:*:*:*:*
cpe:2.3:a:strongswan:strongswan:2.8.8:*:*:*:*:*:*:*
cpe:2.3:a:strongswan:strongswan:2.8.9:*:*:*:*:*:*:*
cpe:2.3:a:strongswan:strongswan:2.8.10:*:*:*:*:*:*:*
cpe:2.3:a:strongswan:strongswan:2.8.11:*:*:*:*:*:*:*
cpe:2.3:a:strongswan:strongswan:4.0.0:*:*:*:*:*:*:*
cpe:2.3:a:strongswan:strongswan:4.0.1:*:*:*:*:*:*:*
cpe:2.3:a:strongswan:strongswan:4.0.2:*:*:*:*:*:*:*
cpe:2.3:a:strongswan:strongswan:4.0.3:*:*:*:*:*:*:*
cpe:2.3:a:strongswan:strongswan:4.0.4:*:*:*:*:*:*:*
cpe:2.3:a:strongswan:strongswan:4.0.5:*:*:*:*:*:*:*
cpe:2.3:a:strongswan:strongswan:4.0.6:*:*:*:*:*:*:*
cpe:2.3:a:strongswan:strongswan:4.0.7:*:*:*:*:*:*:*
cpe:2.3:a:strongswan:strongswan:4.1:*:*:*:*:*:*:*
cpe:2.3:a:strongswan:strongswan:4.1.0:*:*:*:*:*:*:*
cpe:2.3:a:strongswan:strongswan:4.1.1:*:*:*:*:*:*:*
cpe:2.3:a:strongswan:strongswan:4.1.2:*:*:*:*:*:*:*
cpe:2.3:a:strongswan:strongswan:4.1.3:*:*:*:*:*:*:*
cpe:2.3:a:strongswan:strongswan:4.1.4:*:*:*:*:*:*:*
cpe:2.3:a:strongswan:strongswan:4.1.5:*:*:*:*:*:*:*
cpe:2.3:a:strongswan:strongswan:4.1.6:*:*:*:*:*:*:*
cpe:2.3:a:strongswan:strongswan:4.1.7:*:*:*:*:*:*:*
cpe:2.3:a:strongswan:strongswan:4.1.8:*:*:*:*:*:*:*
cpe:2.3:a:strongswan:strongswan:4.1.9:*:*:*:*:*:*:*
cpe:2.3:a:strongswan:strongswan:4.1.10:*:*:*:*:*:*:*
cpe:2.3:a:strongswan:strongswan:4.1.11:*:*:*:*:*:*:*
cpe:2.3:a:strongswan:strongswan:4.2.0:*:*:*:*:*:*:*
cpe:2.3:a:strongswan:strongswan:4.2.1:*:*:*:*:*:*:*
cpe:2.3:a:strongswan:strongswan:4.2.2:*:*:*:*:*:*:*
cpe:2.3:a:strongswan:strongswan:4.2.3:*:*:*:*:*:*:*
cpe:2.3:a:strongswan:strongswan:4.2.4:*:*:*:*:*:*:*
cpe:2.3:a:strongswan:strongswan:4.2.5:*:*:*:*:*:*:*
cpe:2.3:a:strongswan:strongswan:4.2.6:*:*:*:*:*:*:*
cpe:2.3:a:strongswan:strongswan:4.2.7:*:*:*:*:*:*:*
cpe:2.3:a:strongswan:strongswan:4.2.8:*:*:*:*:*:*:*
cpe:2.3:a:strongswan:strongswan:4.2.9:*:*:*:*:*:*:*
cpe:2.3:a:strongswan:strongswan:4.2.10:*:*:*:*:*:*:*
cpe:2.3:a:strongswan:strongswan:4.2.11:*:*:*:*:*:*:*
cpe:2.3:a:strongswan:strongswan:4.2.12:*:*:*:*:*:*:*
cpe:2.3:a:strongswan:strongswan:4.2.13:*:*:*:*:*:*:*
cpe:2.3:a:strongswan:strongswan:4.2.14:*:*:*:*:*:*:*
cpe:2.3:a:strongswan:strongswan:4.2.15:*:*:*:*:*:*:*
cpe:2.3:a:strongswan:strongswan:4.2.16:*:*:*:*:*:*:*
cpe:2.3:a:strongswan:strongswan:4.3.0:*:*:*:*:*:*:*
cpe:2.3:a:strongswan:strongswan:4.3.1:*:*:*:*:*:*:*
cpe:2.3:a:strongswan:strongswan:4.3.2:*:*:*:*:*:*:*
cpe:2.3:a:strongswan:strongswan:4.3.3:*:*:*:*:*:*:*
cpe:2.3:a:strongswan:strongswan:4.3.4:*:*:*:*:*:*:*

History

21 Nov 2024, 01:50

Type Values Removed Values Added
References () http://download.strongswan.org/security/CVE-2013-2054/CVE-2013-2054.txt - Vendor Advisory () http://download.strongswan.org/security/CVE-2013-2054/CVE-2013-2054.txt - Vendor Advisory
References () http://www.securityfocus.com/bid/59837 - () http://www.securityfocus.com/bid/59837 -
References () https://lists.libreswan.org/pipermail/swan-announce/2013/000003.html - () https://lists.libreswan.org/pipermail/swan-announce/2013/000003.html -

07 Nov 2023, 02:14

Type Values Removed Values Added
Summary Buffer overflow in the atodn function in strongSwan 2.0.0 through 4.3.4, when Opportunistic Encryption is enabled and an RSA key is being used, allows remote attackers to cause a denial of service (pluto IKE daemon crash) and possibly execute arbitrary code via crafted DNS TXT records. NOTE: this might be the same vulnerability as CVE-2013-2053 and CVE-2013-2054. Buffer overflow in the atodn function in strongSwan 2.0.0 through 4.3.4, when Opportunistic Encryption is enabled and an RSA key is being used, allows remote attackers to cause a denial of service (pluto IKE daemon crash) and possibly execute arbitrary code via crafted DNS TXT records. NOTE: this might be the same vulnerability as CVE-2013-2053 and CVE-2013-2054.

Information

Published : 2013-07-09 17:55

Updated : 2024-11-21 01:50


NVD link : CVE-2013-2054

Mitre link : CVE-2013-2054

CVE.ORG link : CVE-2013-2054


JSON object : View

Products Affected

strongswan

  • strongswan
CWE
CWE-119

Improper Restriction of Operations within the Bounds of a Memory Buffer