Unrated severityNVD Advisory· Published Jul 9, 2013· Updated Apr 29, 2026
CVE-2013-2053
CVE-2013-2053
Description
Buffer overflow in the atodn function in Openswan before 2.6.39, when Opportunistic Encryption is enabled and an RSA key is being used, allows remote attackers to cause a denial of service (pluto IKE daemon crash) and possibly execute arbitrary code via crafted DNS TXT records. NOTE: this might be the same vulnerability as CVE-2013-2052 and CVE-2013-2054.
Affected products
38cpe:2.3:a:xelerance:openswan:*:*:*:*:*:*:*:*+ 37 more
- cpe:2.3:a:xelerance:openswan:*:*:*:*:*:*:*:*range: <=2.6.38
- cpe:2.3:a:xelerance:openswan:2.6.01:*:*:*:*:*:*:*
- cpe:2.3:a:xelerance:openswan:2.6.02:*:*:*:*:*:*:*
- cpe:2.3:a:xelerance:openswan:2.6.03:*:*:*:*:*:*:*
- cpe:2.3:a:xelerance:openswan:2.6.04:*:*:*:*:*:*:*
- cpe:2.3:a:xelerance:openswan:2.6.05:*:*:*:*:*:*:*
- cpe:2.3:a:xelerance:openswan:2.6.06:*:*:*:*:*:*:*
- cpe:2.3:a:xelerance:openswan:2.6.07:*:*:*:*:*:*:*
- cpe:2.3:a:xelerance:openswan:2.6.08:*:*:*:*:*:*:*
- cpe:2.3:a:xelerance:openswan:2.6.09:*:*:*:*:*:*:*
- cpe:2.3:a:xelerance:openswan:2.6.10:*:*:*:*:*:*:*
- cpe:2.3:a:xelerance:openswan:2.6.11:*:*:*:*:*:*:*
- cpe:2.3:a:xelerance:openswan:2.6.12:*:*:*:*:*:*:*
- cpe:2.3:a:xelerance:openswan:2.6.13:*:*:*:*:*:*:*
- cpe:2.3:a:xelerance:openswan:2.6.14:*:*:*:*:*:*:*
- cpe:2.3:a:xelerance:openswan:2.6.15:*:*:*:*:*:*:*
- cpe:2.3:a:xelerance:openswan:2.6.16:*:*:*:*:*:*:*
- cpe:2.3:a:xelerance:openswan:2.6.17:*:*:*:*:*:*:*
- cpe:2.3:a:xelerance:openswan:2.6.18:*:*:*:*:*:*:*
- cpe:2.3:a:xelerance:openswan:2.6.19:*:*:*:*:*:*:*
- cpe:2.3:a:xelerance:openswan:2.6.20:*:*:*:*:*:*:*
- cpe:2.3:a:xelerance:openswan:2.6.21:*:*:*:*:*:*:*
- cpe:2.3:a:xelerance:openswan:2.6.22:*:*:*:*:*:*:*
- cpe:2.3:a:xelerance:openswan:2.6.23:*:*:*:*:*:*:*
- cpe:2.3:a:xelerance:openswan:2.6.24:*:*:*:*:*:*:*
- cpe:2.3:a:xelerance:openswan:2.6.25:*:*:*:*:*:*:*
- cpe:2.3:a:xelerance:openswan:2.6.26:*:*:*:*:*:*:*
- cpe:2.3:a:xelerance:openswan:2.6.27:*:*:*:*:*:*:*
- cpe:2.3:a:xelerance:openswan:2.6.28:*:*:*:*:*:*:*
- cpe:2.3:a:xelerance:openswan:2.6.29:*:*:*:*:*:*:*
- cpe:2.3:a:xelerance:openswan:2.6.30:*:*:*:*:*:*:*
- cpe:2.3:a:xelerance:openswan:2.6.31:*:*:*:*:*:*:*
- cpe:2.3:a:xelerance:openswan:2.6.32:*:*:*:*:*:*:*
- cpe:2.3:a:xelerance:openswan:2.6.33:*:*:*:*:*:*:*
- cpe:2.3:a:xelerance:openswan:2.6.34:*:*:*:*:*:*:*
- cpe:2.3:a:xelerance:openswan:2.6.35:*:*:*:*:*:*:*
- cpe:2.3:a:xelerance:openswan:2.6.36:*:*:*:*:*:*:*
- cpe:2.3:a:xelerance:openswan:2.6.37:*:*:*:*:*:*:*
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
7- www.openswan.org/news/13nvdVendor Advisory
- lists.opensuse.org/opensuse-security-announce/2013-07/msg00008.htmlnvd
- rhn.redhat.com/errata/RHSA-2013-0827.htmlnvd
- www.debian.org/security/2014/dsa-2893nvd
- www.securityfocus.com/bid/59838nvd
- bugzilla.redhat.com/show_bug.cginvd
- lists.libreswan.org/pipermail/swan-announce/2013/000003.htmlnvd
News mentions
0No linked articles in our index yet.