CVE-2013-6075

EUVD-2013-5904
The compare_dn function in utils/identification.c in strongSwan 4.3.3 through 5.1.1 allows (1) remote attackers to cause a denial of service (out-of-bounds read, NULL pointer dereference, and daemon crash) or (2) remote authenticated users to impersonate arbitrary users and bypass access restrictions via a crafted ID_DER_ASN1_DN ID, related to an "insufficient length check" during identity comparison.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTPrimary
5 UNKNOWN
NETWORK
LOW
AV:N/AC:L/Au:N/C:N/I:N/A:P
Base Score
CVSS 3.x
EPSS Score
Percentile: 45%
Affected Products (NVD)
VendorProductVersion
strongswanstrongswan
4.3.3
strongswanstrongswan
4.3.4
strongswanstrongswan
4.3.5
strongswanstrongswan
4.3.6
strongswanstrongswan
4.3.7
strongswanstrongswan
4.4.0
strongswanstrongswan
4.4.1
strongswanstrongswan
4.5.0
strongswanstrongswan
4.5.1
strongswanstrongswan
4.5.2
strongswanstrongswan
4.5.3
strongswanstrongswan
4.6.0
strongswanstrongswan
4.6.1
strongswanstrongswan
4.6.2
strongswanstrongswan
4.6.3
strongswanstrongswan
4.6.4
strongswanstrongswan
5.0.0
strongswanstrongswan
5.0.1
strongswanstrongswan
5.0.2
strongswanstrongswan
5.0.3
strongswanstrongswan
5.0.4
strongswanstrongswan
5.1.0
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
strongswan
bookworm
5.9.8-5+deb12u1
fixed
bookworm (security)
5.9.8-5+deb12u1
fixed
bullseye
5.9.1-1+deb11u4
fixed
bullseye (security)
5.9.1-1+deb11u4
fixed
sid
5.9.13-2
fixed
trixie
5.9.13-2
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
strongswan
lucid
ignored
precise
ignored
quantal
ignored
raring
ignored
saucy
ignored
trusty
not-affected
utopic
not-affected
vivid
not-affected
wily
not-affected
xenial
not-affected
yakkety
not-affected
zesty
not-affected