First published: Mon May 06 2013(Updated: )
Buffer overflow in the atodn function in Openswan before 2.6.39, when Opportunistic Encryption is enabled and an RSA key is being used, allows remote attackers to cause a denial of service (pluto IKE daemon crash) and possibly execute arbitrary code via crafted DNS TXT records. NOTE: this might be the same vulnerability as CVE-2013-2052 and CVE-2013-2054.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Xelerance Openswan | <=2.6.38 | |
Xelerance Openswan | =2.6.01 | |
Xelerance Openswan | =2.6.02 | |
Xelerance Openswan | =2.6.03 | |
Xelerance Openswan | =2.6.04 | |
Xelerance Openswan | =2.6.05 | |
Xelerance Openswan | =2.6.06 | |
Xelerance Openswan | =2.6.07 | |
Xelerance Openswan | =2.6.08 | |
Xelerance Openswan | =2.6.09 | |
Xelerance Openswan | =2.6.10 | |
Xelerance Openswan | =2.6.11 | |
Xelerance Openswan | =2.6.12 | |
Xelerance Openswan | =2.6.13 | |
Xelerance Openswan | =2.6.14 | |
Xelerance Openswan | =2.6.15 | |
Xelerance Openswan | =2.6.16 | |
Xelerance Openswan | =2.6.17 | |
Xelerance Openswan | =2.6.18 | |
Xelerance Openswan | =2.6.19 | |
Xelerance Openswan | =2.6.20 | |
Xelerance Openswan | =2.6.21 | |
Xelerance Openswan | =2.6.22 | |
Xelerance Openswan | =2.6.23 | |
Xelerance Openswan | =2.6.24 | |
Xelerance Openswan | =2.6.25 | |
Xelerance Openswan | =2.6.26 | |
Xelerance Openswan | =2.6.27 | |
Xelerance Openswan | =2.6.28 | |
Xelerance Openswan | =2.6.29 | |
Xelerance Openswan | =2.6.30 | |
Xelerance Openswan | =2.6.31 | |
Xelerance Openswan | =2.6.32 | |
Xelerance Openswan | =2.6.33 | |
Xelerance Openswan | =2.6.34 | |
Xelerance Openswan | =2.6.35 | |
Xelerance Openswan | =2.6.36 | |
Xelerance Openswan | =2.6.37 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.