CVE-2013-2052

NameCVE-2013-2052
DescriptionBuffer overflow in the atodn function in libreswan 3.0 and 3.1, when Opportunistic Encryption is enabled and an RSA key is being used, allows remote attackers to cause a denial of service (pluto IKE daemon crash) and possibly execute arbitrary code via crafted DNS TXT records. NOTE: this might be the same vulnerability as CVE-2013-2053 and CVE-2013-2054.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
libreswan (PTS)buster, buster (security)3.27-6+deb10u1fixed
bullseye4.3-1+deb11u4fixed
bullseye (security)4.3-1+deb11u3fixed
bookworm4.10-2+deb12u1fixed
sid4.14-1fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
libreswansource(unstable)(not affected)

Notes

- libreswan <not-affected> (Fixed before the initial upload to Debian)
https://libreswan.org/security/CVE-2013-2052/CVE-2013-2052.txt

Search for package or bug name: Reporting problems