[Forgot Password]
Login  Register Subscribe

30389

 
 

423868

 
 

244411

 
 

909

 
 

193363

 
 

277

Paid content will be excluded from the download.


Download | Alert*
CVE
view JSON

CVE-2013-6075Date: (C)2013-11-08   (M)2023-12-22


The compare_dn function in utils/identification.c in strongSwan 4.3.3 through 5.1.1 allows (1) remote attackers to cause a denial of service (out-of-bounds read, NULL pointer dereference, and daemon crash) or (2) remote authenticated users to impersonate arbitrary users and bypass access restrictions via a crafted ID_DER_ASN1_DN ID, related to an "insufficient length check" during identity comparison.

CVSS Score and Metrics +CVSS Score and Metrics -

CVSS V2 Severity:
CVSS Score : 5.0
Exploit Score: 10.0
Impact Score: 2.9
 
CVSS V2 Metrics:
Access Vector: NETWORK
Access Complexity: LOW
Authentication: NONE
Confidentiality: NONE
Integrity: NONE
Availability: PARTIAL
  
Reference:
DSA-2789
http://download.strongswan.org/security/CVE-2013-6075/strongswan-4.3.3-5.1.0_id_dn_match.patch
http://www.strongswan.org/blog/2013/11/01/strongswan-denial-of-service-vulnerability-%28cve-2013-6075%29.html

CPE    22
cpe:/a:strongswan:strongswan:4.6.3
cpe:/a:strongswan:strongswan:4.3.6
cpe:/a:strongswan:strongswan:4.5.3
cpe:/a:strongswan:strongswan:4.6.2
...
CWE    1
CWE-119
OVAL    6
oval:org.secpod.oval:def:106350
oval:org.secpod.oval:def:601139
oval:org.secpod.oval:def:108562
oval:org.secpod.oval:def:106937
...

© SecPod Technologies