CVE-2013-5018
Published Aug 28, 2013
Last updated 6 years ago
Overview
- Description
- The is_asn1 function in strongSwan 4.1.11 through 5.0.4 does not properly validate the return value of the asn1_length function, which allows remote attackers to cause a denial of service (segmentation fault) via a (1) XAuth username, (2) EAP identity, or (3) PEM encoded file that starts with a 0x04, 0x30, or 0x31 character followed by an ASN.1 length value that triggers an integer overflow.
- Source
- cve@mitre.org
- NVD status
- Modified
Social media
- Hype score
- Not currently trending
Risk scores
CVSS 2.0
- Type
- Primary
- Base score
- 4.3
- Impact score
- 2.9
- Exploitability score
- 8.6
- Vector string
- AV:N/AC:M/Au:N/C:N/I:N/A:P
Weaknesses
- nvd@nist.gov
- CWE-119
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:strongswan:strongswan:4.1.11:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "7D636603-65D5-45DB-AF7F-DD01B3932914" } ], "operator": "OR" } ] }, { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:strongswan:strongswan:5.0.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "944942A8-79D0-40AC-BE98-D552DCF2BB07" }, { "criteria": "cpe:2.3:a:strongswan:strongswan:5.0.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "905ABDB8-6CC3-4F7F-8853-8EDDA5E5AB8F" }, { "criteria": "cpe:2.3:a:strongswan:strongswan:5.0.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "14E2A13E-427F-45A7-B898-64C10CD8962B" }, { "criteria": "cpe:2.3:a:strongswan:strongswan:5.0.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "40ED1E2A-B769-4B1D-83D1-300789E03C97" }, { "criteria": "cpe:2.3:a:strongswan:strongswan:5.0.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "339D620A-CD60-4078-81A1-5703B1CFBB3D" } ], "operator": "OR" } ] }, { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:o:opensuse:opensuse:11.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "DE554781-1EB9-446E-911F-6C11970C47F4" }, { "criteria": "cpe:2.3:o:opensuse:opensuse:12.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D806A17E-B8F9-466D-807D-3F1E77603DC8" }, { "criteria": "cpe:2.3:o:opensuse:opensuse:12.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "DFBF430B-0832-44B0-AA0E-BA9E467F7668" } ], "operator": "OR" } ] } ]