Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

oracle-oval логотип

ELSA-2013-0827

Опубликовано: 15 мая 2013
Источник: oracle-oval
Платформа: Oracle Linux 6
Платформа: Oracle Linux 5

Описание

ELSA-2013-0827: openswan security update (IMPORTANT)

[2.6.32-20] Resolves: #960234 - CVE-2013-2053

Обновленные пакеты

Oracle Linux 6

Oracle Linux x86_64

openswan

2.6.32-20.el6_4

openswan-doc

2.6.32-20.el6_4

Oracle Linux i686

openswan

2.6.32-20.el6_4

openswan-doc

2.6.32-20.el6_4

Oracle Linux 5

Oracle Linux ia64

openswan

2.6.32-5.el5_9

openswan-doc

2.6.32-5.el5_9

Oracle Linux x86_64

openswan

2.6.32-5.el5_9

openswan-doc

2.6.32-5.el5_9

Oracle Linux i386

openswan

2.6.32-5.el5_9

openswan-doc

2.6.32-5.el5_9

Связанные CVE

Связанные уязвимости

ubuntu
около 12 лет назад

Buffer overflow in the atodn function in Openswan before 2.6.39, when Opportunistic Encryption is enabled and an RSA key is being used, allows remote attackers to cause a denial of service (pluto IKE daemon crash) and possibly execute arbitrary code via crafted DNS TXT records. NOTE: this might be the same vulnerability as CVE-2013-2052 and CVE-2013-2054.

redhat
больше 12 лет назад

Buffer overflow in the atodn function in Openswan before 2.6.39, when Opportunistic Encryption is enabled and an RSA key is being used, allows remote attackers to cause a denial of service (pluto IKE daemon crash) and possibly execute arbitrary code via crafted DNS TXT records. NOTE: this might be the same vulnerability as CVE-2013-2052 and CVE-2013-2054.

nvd
около 12 лет назад

Buffer overflow in the atodn function in Openswan before 2.6.39, when Opportunistic Encryption is enabled and an RSA key is being used, allows remote attackers to cause a denial of service (pluto IKE daemon crash) and possibly execute arbitrary code via crafted DNS TXT records. NOTE: this might be the same vulnerability as CVE-2013-2052 and CVE-2013-2054.

debian
около 12 лет назад

Buffer overflow in the atodn function in Openswan before 2.6.39, when ...

github
больше 3 лет назад

Buffer overflow in the atodn function in Openswan before 2.6.39, when Opportunistic Encryption is enabled and an RSA key is being used, allows remote attackers to cause a denial of service (pluto IKE daemon crash) and possibly execute arbitrary code via crafted DNS TXT records. NOTE: this might be the same vulnerability as CVE-2013-2052 and CVE-2013-2054.