Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!
Bug 483202 (CVE-2013-2054) - <net-misc/strongswan-5.1.0 : Buffer overflow (CVE-2013-2054)
Summary: <net-misc/strongswan-5.1.0 : Buffer overflow (CVE-2013-2054)
Status: RESOLVED FIXED
Alias: CVE-2013-2054
Product: Gentoo Security
Classification: Unclassified
Component: Vulnerabilities (show other bugs)
Hardware: All Linux
: Normal normal (vote)
Assignee: Gentoo Security
URL:
Whiteboard: C2 [glsa]
Keywords:
Depends on:
Blocks:
 
Reported: 2013-08-31 22:06 UTC by GLSAMaker/CVETool Bot
Modified: 2013-09-02 18:20 UTC (History)
2 users (show)

See Also:
Package list:
Runtime testing required: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description GLSAMaker/CVETool Bot gentoo-dev 2013-08-31 22:06:34 UTC
CVE-2013-2054 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2054):
  Buffer overflow in the atodn function in strongSwan 2.0.0 through 4.3.4,
  when Opportunistic Encryption is enabled and an RSA key is being used,
  allows remote attackers to cause a denial of service (pluto IKE daemon
  crash) and possibly execute arbitrary code via crafted DNS TXT records. 
  NOTE: this might be the same vulnerability as CVE-2013-2053 and
  CVE-2013-2054.
Comment 1 Chris Reffett (RETIRED) gentoo-dev Security 2013-08-31 22:08:08 UTC
Adding to existing GLSA request.
Comment 2 GLSAMaker/CVETool Bot gentoo-dev 2013-09-02 01:30:58 UTC
This issue was resolved and addressed in
 GLSA 201309-02 at http://security.gentoo.org/glsa/glsa-201309-02.xml
by GLSA coordinator Chris Reffett (creffett).