Vulnerability Details CVE-2013-2053
Buffer overflow in the atodn function in Openswan before 2.6.39, when Opportunistic Encryption is enabled and an RSA key is being used, allows remote attackers to cause a denial of service (pluto IKE daemon crash) and possibly execute arbitrary code via crafted DNS TXT records. NOTE: this might be the same vulnerability as CVE-2013-2052 and CVE-2013-2054.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.016
EPSS Ranking 81.0%
CVSS Severity
CVSS v2 Score 6.8
Products affected by CVE-2013-2053
-
cpe:2.3:a:xelerance:openswan:-
-
cpe:2.3:a:xelerance:openswan:0.9.9
-
cpe:2.3:a:xelerance:openswan:2.3.0
-
cpe:2.3:a:xelerance:openswan:2.3.1
-
cpe:2.3:a:xelerance:openswan:2.4
-
cpe:2.3:a:xelerance:openswan:2.4.0
-
cpe:2.3:a:xelerance:openswan:2.4.1
-
cpe:2.3:a:xelerance:openswan:2.4.10
-
cpe:2.3:a:xelerance:openswan:2.4.11
-
cpe:2.3:a:xelerance:openswan:2.4.12
-
cpe:2.3:a:xelerance:openswan:2.4.13
-
cpe:2.3:a:xelerance:openswan:2.4.2
-
cpe:2.3:a:xelerance:openswan:2.4.3
-
cpe:2.3:a:xelerance:openswan:2.4.4
-
cpe:2.3:a:xelerance:openswan:2.4.5
-
cpe:2.3:a:xelerance:openswan:2.4.6
-
cpe:2.3:a:xelerance:openswan:2.4.7
-
cpe:2.3:a:xelerance:openswan:2.4.8
-
cpe:2.3:a:xelerance:openswan:2.4.9
-
cpe:2.3:a:xelerance:openswan:2.5.0
-
cpe:2.3:a:xelerance:openswan:2.5.00
-
cpe:2.3:a:xelerance:openswan:2.5.01
-
cpe:2.3:a:xelerance:openswan:2.5.02
-
cpe:2.3:a:xelerance:openswan:2.5.03
-
cpe:2.3:a:xelerance:openswan:2.5.04
-
cpe:2.3:a:xelerance:openswan:2.5.05
-
cpe:2.3:a:xelerance:openswan:2.5.06
-
cpe:2.3:a:xelerance:openswan:2.5.07
-
cpe:2.3:a:xelerance:openswan:2.5.08
-
cpe:2.3:a:xelerance:openswan:2.5.09
-
cpe:2.3:a:xelerance:openswan:2.5.10
-
cpe:2.3:a:xelerance:openswan:2.5.11
-
cpe:2.3:a:xelerance:openswan:2.5.12
-
cpe:2.3:a:xelerance:openswan:2.5.13
-
cpe:2.3:a:xelerance:openswan:2.5.14
-
cpe:2.3:a:xelerance:openswan:2.5.15
-
cpe:2.3:a:xelerance:openswan:2.5.16
-
cpe:2.3:a:xelerance:openswan:2.5.17
-
cpe:2.3:a:xelerance:openswan:2.5.18
-
cpe:2.3:a:xelerance:openswan:2.6.01
-
cpe:2.3:a:xelerance:openswan:2.6.02
-
cpe:2.3:a:xelerance:openswan:2.6.03
-
cpe:2.3:a:xelerance:openswan:2.6.04
-
cpe:2.3:a:xelerance:openswan:2.6.05
-
cpe:2.3:a:xelerance:openswan:2.6.06
-
cpe:2.3:a:xelerance:openswan:2.6.07
-
cpe:2.3:a:xelerance:openswan:2.6.08
-
cpe:2.3:a:xelerance:openswan:2.6.09
-
cpe:2.3:a:xelerance:openswan:2.6.10
-
cpe:2.3:a:xelerance:openswan:2.6.11
-
cpe:2.3:a:xelerance:openswan:2.6.12
-
cpe:2.3:a:xelerance:openswan:2.6.13
-
cpe:2.3:a:xelerance:openswan:2.6.14
-
cpe:2.3:a:xelerance:openswan:2.6.15
-
cpe:2.3:a:xelerance:openswan:2.6.16
-
cpe:2.3:a:xelerance:openswan:2.6.17
-
cpe:2.3:a:xelerance:openswan:2.6.18
-
cpe:2.3:a:xelerance:openswan:2.6.19
-
cpe:2.3:a:xelerance:openswan:2.6.20
-
cpe:2.3:a:xelerance:openswan:2.6.21
-
cpe:2.3:a:xelerance:openswan:2.6.22
-
cpe:2.3:a:xelerance:openswan:2.6.23
-
cpe:2.3:a:xelerance:openswan:2.6.24
-
cpe:2.3:a:xelerance:openswan:2.6.25
-
cpe:2.3:a:xelerance:openswan:2.6.26
-
cpe:2.3:a:xelerance:openswan:2.6.27
-
cpe:2.3:a:xelerance:openswan:2.6.28
-
cpe:2.3:a:xelerance:openswan:2.6.29
-
cpe:2.3:a:xelerance:openswan:2.6.30
-
cpe:2.3:a:xelerance:openswan:2.6.31
-
cpe:2.3:a:xelerance:openswan:2.6.32
-
cpe:2.3:a:xelerance:openswan:2.6.33
-
cpe:2.3:a:xelerance:openswan:2.6.34
-
cpe:2.3:a:xelerance:openswan:2.6.35
-
cpe:2.3:a:xelerance:openswan:2.6.36
-
cpe:2.3:a:xelerance:openswan:2.6.37
-
cpe:2.3:a:xelerance:openswan:2.6.38