Vulnerability Description
Buffer overflow in the atodn function in libreswan 3.0 and 3.1, when Opportunistic Encryption is enabled and an RSA key is being used, allows remote attackers to cause a denial of service (pluto IKE daemon crash) and possibly execute arbitrary code via crafted DNS TXT records. NOTE: this might be the same vulnerability as CVE-2013-2053 and CVE-2013-2054.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Libreswan | Libreswan | 3.0 |
Related Weaknesses (CWE)
References
- https://libreswan.org/security/CVE-2013-2052/CVE-2013-2052.txtPatchVendor Advisory
- https://lists.libreswan.org/pipermail/swan-announce/2013/000003.htmlVendor Advisory
- https://libreswan.org/security/CVE-2013-2052/CVE-2013-2052.txtPatchVendor Advisory
- https://lists.libreswan.org/pipermail/swan-announce/2013/000003.htmlVendor Advisory
FAQ
What is CVE-2013-2052?
CVE-2013-2052 is a vulnerability with a CVSS score of 5.1 (MEDIUM). Buffer overflow in the atodn function in libreswan 3.0 and 3.1, when Opportunistic Encryption is enabled and an RSA key is being used, allows remote attackers to cause a denial of service (pluto IKE d...
How severe is CVE-2013-2052?
CVE-2013-2052 has been rated MEDIUM with a CVSS base score of 5.1/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2013-2052?
Check the references section above for vendor advisories and patch information. Affected products include: Libreswan Libreswan.