2023-04-24 12:24:31 +02:00
{
"id" : "CVE-2013-2053" ,
"sourceIdentifier" : "secalert@redhat.com" ,
"published" : "2013-07-09T17:55:01.030" ,
2024-11-22 19:15:24 +00:00
"lastModified" : "2024-11-21T01:50:56.423" ,
2023-04-24 12:24:31 +02:00
"vulnStatus" : "Modified" ,
2024-12-08 03:06:42 +00:00
"cveTags" : [ ] ,
2023-04-24 12:24:31 +02:00
"descriptions" : [
{
"lang" : "en" ,
2023-11-07 21:03:21 +00:00
"value" : "Buffer overflow in the atodn function in Openswan before 2.6.39, when Opportunistic Encryption is enabled and an RSA key is being used, allows remote attackers to cause a denial of service (pluto IKE daemon crash) and possibly execute arbitrary code via crafted DNS TXT records. NOTE: this might be the same vulnerability as CVE-2013-2052 and CVE-2013-2054."
2023-04-24 12:24:31 +02:00
} ,
{
"lang" : "es" ,
"value" : "Desbordamiento de buffer en la funci\u00f3n atodn en Openswan anteriores a v2.6.39, cuando est\u00e1 activada Opportunistic Encryptiony se usa una clave RSA, permite a los atacantes remotos provocar una denegaci\u00f3n de servicio (ca\u00edda del demonio IKE)y posiblemente ejecutar c\u00f3digo a trav\u00e9s de registros DNS TXT. Nota: esta podr\u00eda ser la misma vulnerabilidad que CVE-2013-2052 y CVE-2013-2054."
}
] ,
"metrics" : {
"cvssMetricV2" : [
{
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
"cvssData" : {
"version" : "2.0" ,
"vectorString" : "AV:N/AC:M/Au:N/C:P/I:P/A:P" ,
2024-11-22 19:15:24 +00:00
"baseScore" : 6.8 ,
2023-04-24 12:24:31 +02:00
"accessVector" : "NETWORK" ,
"accessComplexity" : "MEDIUM" ,
"authentication" : "NONE" ,
"confidentialityImpact" : "PARTIAL" ,
"integrityImpact" : "PARTIAL" ,
2024-11-22 19:15:24 +00:00
"availabilityImpact" : "PARTIAL"
2023-04-24 12:24:31 +02:00
} ,
"baseSeverity" : "MEDIUM" ,
"exploitabilityScore" : 8.6 ,
"impactScore" : 6.4 ,
"acInsufInfo" : false ,
"obtainAllPrivilege" : false ,
"obtainUserPrivilege" : false ,
"obtainOtherPrivilege" : false ,
"userInteractionRequired" : false
}
]
} ,
"weaknesses" : [
{
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
"description" : [
{
"lang" : "en" ,
"value" : "CWE-119"
}
]
}
] ,
"configurations" : [
{
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:xelerance:openswan:*:*:*:*:*:*:*:*" ,
"versionEndIncluding" : "2.6.38" ,
"matchCriteriaId" : "556AEC9E-9100-4946-8A73-269513CF7AAB"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:xelerance:openswan:2.6.01:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "44FC55F9-B802-4843-8590-B24BE51CEABF"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:xelerance:openswan:2.6.02:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "1DE9DD89-B625-47B1-A7C8-0E2B934C2F55"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:xelerance:openswan:2.6.03:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "78325087-599F-448B-8C47-570914FF6C59"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:xelerance:openswan:2.6.04:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "059CFA5C-B262-47AF-94A6-8E74AFB19204"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:xelerance:openswan:2.6.05:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "12F25627-235B-4312-80A4-4E36DE0E72A4"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:xelerance:openswan:2.6.06:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "B3E70B88-6348-42BB-AE96-46BDB1F3C6FB"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:xelerance:openswan:2.6.07:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "12A9DF25-48E8-4D52-A267-1BE0437E9000"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:xelerance:openswan:2.6.08:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "C986533F-E320-46FA-A9F7-DAFDB1A0628A"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:xelerance:openswan:2.6.09:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "7C77DED4-2696-4172-92B7-43034E61F845"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:xelerance:openswan:2.6.10:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "2EDCCFDA-99A8-4590-99F1-95F3A5AD70B4"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:xelerance:openswan:2.6.11:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "BED1BA7D-B603-49D4-9080-4A9FEC056A69"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:xelerance:openswan:2.6.12:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "9E8EB86B-2DD9-4C4B-9C9A-E88B2C458C8B"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:xelerance:openswan:2.6.13:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "207B98DB-5962-4F62-AF5B-D48EF0C0E2A5"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:xelerance:openswan:2.6.14:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "DFB65639-AE3A-4984-93F9-2A8100DCEE6B"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:xelerance:openswan:2.6.15:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "B8921D08-FBA3-4C0A-8944-362909C5EB6B"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:xelerance:openswan:2.6.16:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "3FBD5312-E44F-4996-AA29-AFED53A90E8E"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:xelerance:openswan:2.6.17:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "E1B24C96-47DF-4FA2-8DF4-8241F4964F5F"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:xelerance:openswan:2.6.18:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "A5067B83-AB9E-4819-B5A2-B14A96EB54C6"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:xelerance:openswan:2.6.19:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "773B9BB2-0F65-4604-AF2C-8AC396DDC094"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:xelerance:openswan:2.6.20:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "AA892169-0079-48D9-AEF5-641748CE1BF2"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:xelerance:openswan:2.6.21:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "4A7E9A23-65D9-4C3D-BF2D-007D3428DE2E"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:xelerance:openswan:2.6.22:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "C41815E9-08BC-49ED-9016-5FE804DCC779"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:xelerance:openswan:2.6.23:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "7FA99146-7368-44B6-B7B4-3D77741E5A7A"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:xelerance:openswan:2.6.24:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "A0EF3852-4889-49F0-8D56-1E1FF1E811D9"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:xelerance:openswan:2.6.25:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "D734AD8D-AE91-47C7-BD4D-467CFB63D163"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:xelerance:openswan:2.6.26:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "FE595B96-0618-4DF3-B7C3-479A1DD02670"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:xelerance:openswan:2.6.27:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "F38B9927-1918-4380-8265-E8915D49AECC"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:xelerance:openswan:2.6.28:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "0D3A8294-58D5-429D-9061-EE897AAAED80"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:xelerance:openswan:2.6.29:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "CFAFF39D-126F-4984-A40B-88E94C680141"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:xelerance:openswan:2.6.30:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "73EE725B-C26E-4343-B5F2-F5DF31A197C1"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:xelerance:openswan:2.6.31:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "A26D9508-E43D-4BA2-9734-CDABBD405D26"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:xelerance:openswan:2.6.32:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "01D11526-6DCD-4B73-BACC-FC619D92BBB5"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:xelerance:openswan:2.6.33:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "24641D2D-BB95-4E26-AD96-8CE96B6B3976"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:xelerance:openswan:2.6.34:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "A24A87F0-AE9A-46DB-8E47-7819E18513CE"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:xelerance:openswan:2.6.35:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "13460979-98A3-4873-B9E4-86327F9C2B2A"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:xelerance:openswan:2.6.36:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "DB91B1E2-12F5-4DE1-95D8-400196730902"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:xelerance:openswan:2.6.37:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "3F3F3F1A-8EA5-4065-84F8-3DBC5E4A8F1F"
}
]
}
]
}
] ,
"references" : [
{
"url" : "http://lists.opensuse.org/opensuse-security-announce/2013-07/msg00008.html" ,
"source" : "secalert@redhat.com"
} ,
{
"url" : "http://rhn.redhat.com/errata/RHSA-2013-0827.html" ,
"source" : "secalert@redhat.com"
} ,
{
"url" : "http://www.debian.org/security/2014/dsa-2893" ,
"source" : "secalert@redhat.com"
} ,
{
"url" : "http://www.securityfocus.com/bid/59838" ,
"source" : "secalert@redhat.com"
} ,
{
"url" : "https://bugzilla.redhat.com/show_bug.cgi?id=960229" ,
"source" : "secalert@redhat.com"
} ,
{
"url" : "https://lists.libreswan.org/pipermail/swan-announce/2013/000003.html" ,
"source" : "secalert@redhat.com"
} ,
{
"url" : "https://www.openswan.org/news/13" ,
"source" : "secalert@redhat.com" ,
"tags" : [
"Vendor Advisory"
]
2024-11-22 19:15:24 +00:00
} ,
{
"url" : "http://lists.opensuse.org/opensuse-security-announce/2013-07/msg00008.html" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108"
} ,
{
"url" : "http://rhn.redhat.com/errata/RHSA-2013-0827.html" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108"
} ,
{
"url" : "http://www.debian.org/security/2014/dsa-2893" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108"
} ,
{
"url" : "http://www.securityfocus.com/bid/59838" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108"
} ,
{
"url" : "https://bugzilla.redhat.com/show_bug.cgi?id=960229" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108"
} ,
{
"url" : "https://lists.libreswan.org/pipermail/swan-announce/2013/000003.html" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108"
} ,
{
"url" : "https://www.openswan.org/news/13" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"Vendor Advisory"
]
2023-04-24 12:24:31 +02:00
}
]
}