CVE-2013-2053 (retired)

Priority
Description
Buffer overflow in the atodn function in Openswan before 2.6.39, when
Opportunistic Encryption is enabled and an RSA key is being used, allows
remote attackers to cause a denial of service (pluto IKE daemon crash) and
possibly execute arbitrary code via crafted DNS TXT records. NOTE: this
might be the same vulnerability as CVE-2013-2052 and CVE-2013-2054.
Package
Upstream:needs-triage
Ubuntu 12.04 ESM (Precise Pangolin):DNE (precise was needed)
Trusty/esm:DNE (trusty was needed)
Ubuntu 16.04 LTS (Xenial Xerus):DNE
Ubuntu 18.04 LTS (Bionic Beaver):DNE
Ubuntu 18.10 (Cosmic Cuttlefish):DNE
Ubuntu 19.04 (Disco Dingo):DNE
Ubuntu 19.10 (Eoan):DNE
Patches:
Upstream:http://libreswan.org/security/CVE-2013-2053/
More Information

Updated: 2019-04-26 14:33:09 UTC (commit 30899e40836d26e1bb5f0b072d31fd87b6cf3bd4)