Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
NVD Vulnerability Details :
CVE-2013-6466
Deferred
More InfoOfficial Page
Source-secalert@redhat.com
View Known Exploited Vulnerability (KEV) details
Published At-26 Jan, 2014 | 20:55
Updated At-11 Apr, 2025 | 00:51

Openswan 2.6.39 and earlier allows remote attackers to cause a denial of service (NULL pointer dereference and IKE daemon restart) via IKEv2 packets that lack expected payloads.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Metrics
TypeVersionBase scoreBase severityVector
Primary2.05.0MEDIUM
AV:N/AC:L/Au:N/C:N/I:N/A:P
CPE Matches

xelerance
xelerance
>>openswan>>Versions up to 2.6.39(inclusive)
cpe:2.3:a:xelerance:openswan:*:*:*:*:*:*:*:*
xelerance
xelerance
>>openswan>>2.3.0
cpe:2.3:a:xelerance:openswan:2.3.0:*:*:*:*:*:*:*
xelerance
xelerance
>>openswan>>2.3.1
cpe:2.3:a:xelerance:openswan:2.3.1:*:*:*:*:*:*:*
xelerance
xelerance
>>openswan>>2.4.0
cpe:2.3:a:xelerance:openswan:2.4.0:*:*:*:*:*:*:*
xelerance
xelerance
>>openswan>>2.4.1
cpe:2.3:a:xelerance:openswan:2.4.1:*:*:*:*:*:*:*
xelerance
xelerance
>>openswan>>2.4.2
cpe:2.3:a:xelerance:openswan:2.4.2:*:*:*:*:*:*:*
xelerance
xelerance
>>openswan>>2.4.3
cpe:2.3:a:xelerance:openswan:2.4.3:*:*:*:*:*:*:*
xelerance
xelerance
>>openswan>>2.4.4
cpe:2.3:a:xelerance:openswan:2.4.4:*:*:*:*:*:*:*
xelerance
xelerance
>>openswan>>2.4.5
cpe:2.3:a:xelerance:openswan:2.4.5:*:*:*:*:*:*:*
xelerance
xelerance
>>openswan>>2.4.6
cpe:2.3:a:xelerance:openswan:2.4.6:*:*:*:*:*:*:*
xelerance
xelerance
>>openswan>>2.4.7
cpe:2.3:a:xelerance:openswan:2.4.7:*:*:*:*:*:*:*
xelerance
xelerance
>>openswan>>2.4.8
cpe:2.3:a:xelerance:openswan:2.4.8:*:*:*:*:*:*:*
xelerance
xelerance
>>openswan>>2.4.9
cpe:2.3:a:xelerance:openswan:2.4.9:*:*:*:*:*:*:*
xelerance
xelerance
>>openswan>>2.4.10
cpe:2.3:a:xelerance:openswan:2.4.10:*:*:*:*:*:*:*
xelerance
xelerance
>>openswan>>2.4.11
cpe:2.3:a:xelerance:openswan:2.4.11:*:*:*:*:*:*:*
xelerance
xelerance
>>openswan>>2.4.12
cpe:2.3:a:xelerance:openswan:2.4.12:*:*:*:*:*:*:*
xelerance
xelerance
>>openswan>>2.4.13
cpe:2.3:a:xelerance:openswan:2.4.13:*:*:*:*:*:*:*
xelerance
xelerance
>>openswan>>2.5.0
cpe:2.3:a:xelerance:openswan:2.5.0:*:*:*:*:*:*:*
xelerance
xelerance
>>openswan>>2.5.0
cpe:2.3:a:xelerance:openswan:2.5.0:sbs4:*:*:*:*:*:*
xelerance
xelerance
>>openswan>>2.5.0
cpe:2.3:a:xelerance:openswan:2.5.0:sbs5:*:*:*:*:*:*
xelerance
xelerance
>>openswan>>2.5.01
cpe:2.3:a:xelerance:openswan:2.5.01:*:*:*:*:*:*:*
xelerance
xelerance
>>openswan>>2.5.02
cpe:2.3:a:xelerance:openswan:2.5.02:*:*:*:*:*:*:*
xelerance
xelerance
>>openswan>>2.5.03
cpe:2.3:a:xelerance:openswan:2.5.03:*:*:*:*:*:*:*
xelerance
xelerance
>>openswan>>2.5.04
cpe:2.3:a:xelerance:openswan:2.5.04:*:*:*:*:*:*:*
xelerance
xelerance
>>openswan>>2.5.05
cpe:2.3:a:xelerance:openswan:2.5.05:*:*:*:*:*:*:*
xelerance
xelerance
>>openswan>>2.5.06
cpe:2.3:a:xelerance:openswan:2.5.06:*:*:*:*:*:*:*
xelerance
xelerance
>>openswan>>2.5.07
cpe:2.3:a:xelerance:openswan:2.5.07:*:*:*:*:*:*:*
xelerance
xelerance
>>openswan>>2.5.08
cpe:2.3:a:xelerance:openswan:2.5.08:*:*:*:*:*:*:*
xelerance
xelerance
>>openswan>>2.5.09
cpe:2.3:a:xelerance:openswan:2.5.09:*:*:*:*:*:*:*
xelerance
xelerance
>>openswan>>2.5.10
cpe:2.3:a:xelerance:openswan:2.5.10:*:*:*:*:*:*:*
xelerance
xelerance
>>openswan>>2.5.11
cpe:2.3:a:xelerance:openswan:2.5.11:*:*:*:*:*:*:*
xelerance
xelerance
>>openswan>>2.5.12
cpe:2.3:a:xelerance:openswan:2.5.12:*:*:*:*:*:*:*
xelerance
xelerance
>>openswan>>2.5.13
cpe:2.3:a:xelerance:openswan:2.5.13:*:*:*:*:*:*:*
xelerance
xelerance
>>openswan>>2.5.14
cpe:2.3:a:xelerance:openswan:2.5.14:*:*:*:*:*:*:*
xelerance
xelerance
>>openswan>>2.5.15
cpe:2.3:a:xelerance:openswan:2.5.15:*:*:*:*:*:*:*
xelerance
xelerance
>>openswan>>2.5.16
cpe:2.3:a:xelerance:openswan:2.5.16:*:*:*:*:*:*:*
xelerance
xelerance
>>openswan>>2.5.17
cpe:2.3:a:xelerance:openswan:2.5.17:*:*:*:*:*:*:*
xelerance
xelerance
>>openswan>>2.5.18
cpe:2.3:a:xelerance:openswan:2.5.18:*:*:*:*:*:*:*
xelerance
xelerance
>>openswan>>2.6.01
cpe:2.3:a:xelerance:openswan:2.6.01:*:*:*:*:*:*:*
xelerance
xelerance
>>openswan>>2.6.02
cpe:2.3:a:xelerance:openswan:2.6.02:*:*:*:*:*:*:*
xelerance
xelerance
>>openswan>>2.6.03
cpe:2.3:a:xelerance:openswan:2.6.03:*:*:*:*:*:*:*
xelerance
xelerance
>>openswan>>2.6.04
cpe:2.3:a:xelerance:openswan:2.6.04:*:*:*:*:*:*:*
xelerance
xelerance
>>openswan>>2.6.05
cpe:2.3:a:xelerance:openswan:2.6.05:*:*:*:*:*:*:*
xelerance
xelerance
>>openswan>>2.6.06
cpe:2.3:a:xelerance:openswan:2.6.06:*:*:*:*:*:*:*
xelerance
xelerance
>>openswan>>2.6.07
cpe:2.3:a:xelerance:openswan:2.6.07:*:*:*:*:*:*:*
xelerance
xelerance
>>openswan>>2.6.08
cpe:2.3:a:xelerance:openswan:2.6.08:*:*:*:*:*:*:*
xelerance
xelerance
>>openswan>>2.6.09
cpe:2.3:a:xelerance:openswan:2.6.09:*:*:*:*:*:*:*
xelerance
xelerance
>>openswan>>2.6.10
cpe:2.3:a:xelerance:openswan:2.6.10:*:*:*:*:*:*:*
xelerance
xelerance
>>openswan>>2.6.11
cpe:2.3:a:xelerance:openswan:2.6.11:*:*:*:*:*:*:*
xelerance
xelerance
>>openswan>>2.6.12
cpe:2.3:a:xelerance:openswan:2.6.12:*:*:*:*:*:*:*
Weaknesses
CWE IDTypeSource
NVD-CWE-OtherPrimarynvd@nist.gov
Evaluator Description

Per: http://cwe.mitre.org/data/definitions/476.html "CWE-476: NULL Pointer Dereference"
Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
http://rhn.redhat.com/errata/RHSA-2014-0185.htmlsecalert@redhat.com
N/A
http://www.debian.org/security/2014/dsa-2893secalert@redhat.com
N/A
http://www.securityfocus.com/bid/65155secalert@redhat.com
N/A
https://cert.vde.com/en-us/advisories/vde-2017-001secalert@redhat.com
N/A
https://exchange.xforce.ibmcloud.com/vulnerabilities/90524secalert@redhat.com
N/A
https://libreswan.org/security/CVE-2013-6467/CVE-2013-6467.txtsecalert@redhat.com
Vendor Advisory
http://rhn.redhat.com/errata/RHSA-2014-0185.htmlaf854a3a-2127-422b-91ae-364da2661108
N/A
http://www.debian.org/security/2014/dsa-2893af854a3a-2127-422b-91ae-364da2661108
N/A
http://www.securityfocus.com/bid/65155af854a3a-2127-422b-91ae-364da2661108
N/A
https://cert.vde.com/en-us/advisories/vde-2017-001af854a3a-2127-422b-91ae-364da2661108
N/A
https://exchange.xforce.ibmcloud.com/vulnerabilities/90524af854a3a-2127-422b-91ae-364da2661108
N/A
https://libreswan.org/security/CVE-2013-6467/CVE-2013-6467.txtaf854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
Change History
0Changes found

Details not found