Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
NVD Vulnerability Details :
CVE-2013-2052
Deferred
More InfoOfficial Page
Source-secalert@redhat.com
View Known Exploited Vulnerability (KEV) details
Published At-09 Jul, 2013 | 17:55
Updated At-11 Apr, 2025 | 00:51

Buffer overflow in the atodn function in libreswan 3.0 and 3.1, when Opportunistic Encryption is enabled and an RSA key is being used, allows remote attackers to cause a denial of service (pluto IKE daemon crash) and possibly execute arbitrary code via crafted DNS TXT records. NOTE: this might be the same vulnerability as CVE-2013-2053 and CVE-2013-2054.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Metrics
TypeVersionBase scoreBase severityVector
Primary2.05.1MEDIUM
AV:N/AC:H/Au:N/C:P/I:P/A:P
CPE Matches

libreswan
libreswan
>>libreswan>>3.0
cpe:2.3:a:libreswan:libreswan:3.0:*:*:*:*:*:*:*
libreswan
libreswan
>>libreswan>>3.1
cpe:2.3:a:libreswan:libreswan:3.1:*:*:*:*:*:*:*
Weaknesses
CWE IDTypeSource
CWE-119Primarynvd@nist.gov
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
https://libreswan.org/security/CVE-2013-2052/CVE-2013-2052.txtsecalert@redhat.com
Patch
Vendor Advisory
https://lists.libreswan.org/pipermail/swan-announce/2013/000003.htmlsecalert@redhat.com
Vendor Advisory
https://libreswan.org/security/CVE-2013-2052/CVE-2013-2052.txtaf854a3a-2127-422b-91ae-364da2661108
Patch
Vendor Advisory
https://lists.libreswan.org/pipermail/swan-announce/2013/000003.htmlaf854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
Change History
0Changes found

Details not found