Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2013-2054

Опубликовано: 09 июл. 2013
Источник: ubuntu
Приоритет: medium
EPSS Низкий
CVSS2: 5.1

Описание

Buffer overflow in the atodn function in strongSwan 2.0.0 through 4.3.4, when Opportunistic Encryption is enabled and an RSA key is being used, allows remote attackers to cause a denial of service (pluto IKE daemon crash) and possibly execute arbitrary code via crafted DNS TXT records. NOTE: this might be the same vulnerability as CVE-2013-2053 and CVE-2013-2054.

РелизСтатусПримечание
devel

not-affected

lucid

ignored

end of life
precise

not-affected

4.5.2-1.2
quantal

not-affected

raring

not-affected

saucy

not-affected

upstream

released

4.3.4-1

Показывать по

EPSS

Процентиль: 82%
0.01817
Низкий

5.1 Medium

CVSS2

Связанные уязвимости

nvd
больше 12 лет назад

Buffer overflow in the atodn function in strongSwan 2.0.0 through 4.3.4, when Opportunistic Encryption is enabled and an RSA key is being used, allows remote attackers to cause a denial of service (pluto IKE daemon crash) and possibly execute arbitrary code via crafted DNS TXT records. NOTE: this might be the same vulnerability as CVE-2013-2053 and CVE-2013-2054.

debian
больше 12 лет назад

Buffer overflow in the atodn function in strongSwan 2.0.0 through 4.3. ...

github
больше 3 лет назад

Buffer overflow in the atodn function in strongSwan 2.0.0 through 4.3.4, when Opportunistic Encryption is enabled and an RSA key is being used, allows remote attackers to cause a denial of service (pluto IKE daemon crash) and possibly execute arbitrary code via crafted DNS TXT records. NOTE: this might be the same vulnerability as CVE-2013-2053 and CVE-2013-2054.

fstec
больше 12 лет назад

Уязвимости операционной системы Gentoo Linux, позволяющие удаленному злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации

EPSS

Процентиль: 82%
0.01817
Низкий

5.1 Medium

CVSS2