7.7 High
AI Score
Confidence
Low
5.1 Medium
CVSS2
Access Vector
NETWORK
Access Complexity
HIGH
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:H/Au:N/C:P/I:P/A:P
0.059 Low
EPSS
Percentile
93.4%
Buffer overflow in the atodn function in strongSwan 2.0.0 through 4.3.4, when Opportunistic Encryption is enabled and an RSA key is being used, allows remote attackers to cause a denial of service (pluto IKE daemon crash) and possibly execute arbitrary code via crafted DNS TXT records. NOTE: this might be the same vulnerability as CVE-2013-2053 and CVE-2013-2054.
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
Debian | 12 | all | strongswan | < 4.3.4-1 | strongswan_4.3.4-1_all.deb |
Debian | 11 | all | strongswan | < 4.3.4-1 | strongswan_4.3.4-1_all.deb |
Debian | 10 | all | strongswan | < 4.3.4-1 | strongswan_4.3.4-1_all.deb |
Debian | 999 | all | strongswan | < 4.3.4-1 | strongswan_4.3.4-1_all.deb |
Debian | 13 | all | strongswan | < 4.3.4-1 | strongswan_4.3.4-1_all.deb |