Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!
Bugzilla DB migration completed. Please report issues to Infra team via email via infra@gentoo.org or IRC

Bug 483202 (CVE-2013-2054)

Summary: <net-misc/strongswan-5.1.0 : Buffer overflow (CVE-2013-2054)
Product: Gentoo Security Reporter: GLSAMaker/CVETool Bot <glsamaker>
Component: VulnerabilitiesAssignee: Gentoo Security <security>
Status: RESOLVED FIXED    
Severity: normal CC: gurligebis, patrick
Priority: Normal    
Version: unspecified   
Hardware: All   
OS: Linux   
Whiteboard: C2 [glsa]
Package list:
Runtime testing required: ---

Description GLSAMaker/CVETool Bot gentoo-dev 2013-08-31 22:06:34 UTC
CVE-2013-2054 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2054):
  Buffer overflow in the atodn function in strongSwan 2.0.0 through 4.3.4,
  when Opportunistic Encryption is enabled and an RSA key is being used,
  allows remote attackers to cause a denial of service (pluto IKE daemon
  crash) and possibly execute arbitrary code via crafted DNS TXT records. 
  NOTE: this might be the same vulnerability as CVE-2013-2053 and
  CVE-2013-2054.
Comment 1 Chris Reffett (RETIRED) gentoo-dev Security 2013-08-31 22:08:08 UTC
Adding to existing GLSA request.
Comment 2 GLSAMaker/CVETool Bot gentoo-dev 2013-09-02 01:30:58 UTC
This issue was resolved and addressed in
 GLSA 201309-02 at http://security.gentoo.org/glsa/glsa-201309-02.xml
by GLSA coordinator Chris Reffett (creffett).