First published: Tue Jul 09 2013(Updated: )
Buffer overflow in the atodn function in libreswan 3.0 and 3.1, when Opportunistic Encryption is enabled and an RSA key is being used, allows remote attackers to cause a denial of service (pluto IKE daemon crash) and possibly execute arbitrary code via crafted DNS TXT records. NOTE: this might be the same vulnerability as CVE-2013-2053 and CVE-2013-2054.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Libreswan | =3.0 | |
Libreswan | =3.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2013-2052 has a high severity rating as it allows for potential remote denial of service and arbitrary code execution.
To address CVE-2013-2052, upgrade to Libreswan version 3.1 or later where the vulnerability is patched.
CVE-2013-2052 affects Libreswan versions 3.0 and 3.1 when Opportunistic Encryption is enabled.
CVE-2013-2052 enables remote attackers to execute a denial of service attack by exploiting a buffer overflow vulnerability.
CVE-2013-2052 can be exploited through crafted DNS TXT records to trigger a buffer overflow.