CVE-2013-2054

Buffer overflow in the atodn function in strongSwan 2.0.0 through 4.3.4, when Opportunistic Encryption is enabled and an RSA key is being used, allows remote attackers to cause a denial of service (pluto IKE daemon crash) and possibly execute arbitrary code via crafted DNS TXT records.  NOTE: this might be the same vulnerability as CVE-2013-2053 and CVE-2013-2054.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTNIST
5.1 UNKNOWN
NETWORK
HIGH
AV:N/AC:H/Au:N/C:P/I:P/A:P
redhatCNA
---
---
CVEADP
---
---
Base Score
CVSS 3.x
EPSS Score
Percentile: 81%
VendorProductVersion
strongswanstrongswan
2.0.0
strongswanstrongswan
2.0.1
strongswanstrongswan
2.0.2
strongswanstrongswan
2.1.0
strongswanstrongswan
2.1.1
strongswanstrongswan
2.1.2
strongswanstrongswan
2.1.3
strongswanstrongswan
2.1.4
strongswanstrongswan
2.1.5
strongswanstrongswan
2.3.0
strongswanstrongswan
2.3.1
strongswanstrongswan
2.3.2
strongswanstrongswan
2.4
strongswanstrongswan
2.4.0
strongswanstrongswan
2.4.0a:a
strongswanstrongswan
2.4.1
strongswanstrongswan
2.4.2
strongswanstrongswan
2.4.3
strongswanstrongswan
2.4.4
strongswanstrongswan
2.5.0
strongswanstrongswan
2.5.1
strongswanstrongswan
2.5.2
strongswanstrongswan
2.5.3
strongswanstrongswan
2.5.4
strongswanstrongswan
2.5.5
strongswanstrongswan
2.5.6
strongswanstrongswan
2.5.7
strongswanstrongswan
2.6
strongswanstrongswan
2.6.0
strongswanstrongswan
2.6.1
strongswanstrongswan
2.6.2
strongswanstrongswan
2.6.3
strongswanstrongswan
2.6.4
strongswanstrongswan
2.6.14
strongswanstrongswan
2.6.16
strongswanstrongswan
2.6.20
strongswanstrongswan
2.6.21
strongswanstrongswan
2.7.0
strongswanstrongswan
2.7.1
strongswanstrongswan
2.7.2
strongswanstrongswan
2.7.3
strongswanstrongswan
2.8.0
strongswanstrongswan
2.8.1
strongswanstrongswan
2.8.2
strongswanstrongswan
2.8.3
strongswanstrongswan
2.8.4
strongswanstrongswan
2.8.5
strongswanstrongswan
2.8.6
strongswanstrongswan
2.8.7
strongswanstrongswan
2.8.8
strongswanstrongswan
2.8.9
strongswanstrongswan
2.8.10
strongswanstrongswan
2.8.11
strongswanstrongswan
4.0.0
strongswanstrongswan
4.0.1
strongswanstrongswan
4.0.2
strongswanstrongswan
4.0.3
strongswanstrongswan
4.0.4
strongswanstrongswan
4.0.5
strongswanstrongswan
4.0.6
strongswanstrongswan
4.0.7
strongswanstrongswan
4.1
strongswanstrongswan
4.1.0
strongswanstrongswan
4.1.1
strongswanstrongswan
4.1.2
strongswanstrongswan
4.1.3
strongswanstrongswan
4.1.4
strongswanstrongswan
4.1.5
strongswanstrongswan
4.1.6
strongswanstrongswan
4.1.7
strongswanstrongswan
4.1.8
strongswanstrongswan
4.1.9
strongswanstrongswan
4.1.10
strongswanstrongswan
4.1.11
strongswanstrongswan
4.2.0
strongswanstrongswan
4.2.1
strongswanstrongswan
4.2.2
strongswanstrongswan
4.2.3
strongswanstrongswan
4.2.4
strongswanstrongswan
4.2.5
strongswanstrongswan
4.2.6
strongswanstrongswan
4.2.7
strongswanstrongswan
4.2.8
strongswanstrongswan
4.2.9
strongswanstrongswan
4.2.10
strongswanstrongswan
4.2.11
strongswanstrongswan
4.2.12
strongswanstrongswan
4.2.13
strongswanstrongswan
4.2.14
strongswanstrongswan
4.2.15
strongswanstrongswan
4.2.16
strongswanstrongswan
4.3.0
strongswanstrongswan
4.3.1
strongswanstrongswan
4.3.2
strongswanstrongswan
4.3.3
strongswanstrongswan
4.3.4
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
strongswan
bullseye (security)
5.9.1-1+deb11u4
fixed
bullseye
5.9.1-1+deb11u4
fixed
bookworm
5.9.8-5+deb12u1
fixed
bookworm (security)
5.9.8-5+deb12u1
fixed
sid
5.9.13-2
fixed
trixie
5.9.13-2
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
strongswan
saucy
not-affected
raring
not-affected
quantal
not-affected
precise
not-affected
lucid
ignored