Lucene search

K
debiancveDebian Security Bug TrackerDEBIANCVE:CVE-2013-6075
HistoryNov 02, 2013 - 6:55 p.m.

CVE-2013-6075

2013-11-0218:55:03
Debian Security Bug Tracker
security-tracker.debian.org
14
cve-2013-6075
strongswan
remote code execution
user impersonation
insufficient length check
denial of service
access restrictions
identification function
daemon crash

CVSS2

5

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:N/I:N/A:P

EPSS

0.007

Percentile

79.7%

The compare_dn function in utils/identification.c in strongSwan 4.3.3 through 5.1.1 allows (1) remote attackers to cause a denial of service (out-of-bounds read, NULL pointer dereference, and daemon crash) or (2) remote authenticated users to impersonate arbitrary users and bypass access restrictions via a crafted ID_DER_ASN1_DN ID, related to an “insufficient length check” during identity comparison.

CVSS2

5

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:N/I:N/A:P

EPSS

0.007

Percentile

79.7%