Skip to navigation

CVE Database

CVE-2013-2053

Impact: Important
Public: 2013-05-13
CWE: CWE-119
Bugzilla: 960229: CVE-2013-2053 Openswan: remote buffer overflow in atodn()

Details

The MITRE CVE dictionary describes this issue as:

Buffer overflow in the atodn function in Openswan before 2.6.39, when Opportunistic Encryption is enabled and an RSA key is being used, allows remote attackers to cause a denial of service (pluto IKE daemon crash) and possibly execute arbitrary code via crafted DNS TXT records. NOTE: this might be the same vulnerability as CVE-2013-2052 and CVE-2013-2054.

Find out more about CVE-2013-2053 from the MITRE CVE dictionary and NIST NVD.

CVSS v2 metrics

Base Score: 7.6
Base Metrics: AV:N/AC:H/Au:N/C:C/I:C/A:C
Access Vector: Network
Access Complexity: High
Authentication: None
Confidentiality Impact: Complete
Integrity Impact: Complete
Availability Impact: Complete

Find out more about Red Hat support for the Common Vulnerability Scoring System (CVSS).

Red Hat security errata

Platform Errata Release Date
Red Hat Enterprise Linux version 5 (openswan) RHSA-2013:0827 May 15, 2013
Red Hat Enterprise Linux version 6 (openswan) RHSA-2013:0827 May 15, 2013

External References

https://lists.libreswan.org/pipermail/swan-announce/2013/000003.html

Acknowledgements

This issue was discovered by Florian Weimer of the Red Hat Product Security Team.

This page is generated automatically and has not been checked for errors or omissions.

For clarification or corrections please contact the Red Hat Security Response Team.