Public Date:
960229: CVE-2013-2053 Openswan: remote buffer overflow in atodn()

The MITRE CVE dictionary describes this issue as:

Buffer overflow in the atodn function in Openswan before 2.6.39, when Opportunistic Encryption is enabled and an RSA key is being used, allows remote attackers to cause a denial of service (pluto IKE daemon crash) and possibly execute arbitrary code via crafted DNS TXT records. NOTE: this might be the same vulnerability as CVE-2013-2052 and CVE-2013-2054.

Find out more about CVE-2013-2053 from the MITRE CVE dictionary dictionary and NIST NVD.

CVSS v2 metrics

Base Score 7.6
Base Metrics AV:N/AC:H/Au:N/C:C/I:C/A:C
Access Vector Network
Access Complexity High
Authentication None
Confidentiality Impact Complete
Integrity Impact Complete
Availability Impact Complete

Find out more about Red Hat support for the Common Vulnerability Scoring System (CVSS).

Red Hat Security Errata

Platform Errata Release Date
Red Hat Enterprise Linux 6 (openswan) RHSA-2013:0827 2013-05-15
Red Hat Enterprise Linux 5 (openswan) RHSA-2013:0827 2013-05-15


This issue was discovered by Florian Weimer of the Red Hat Product Security Team.

External References

Last Modified

CVE description copyright © 2017, The MITRE Corporation