VYPR
Unrated severityNVD Advisory· Published Jan 26, 2014· Updated Apr 29, 2026

CVE-2013-6466

CVE-2013-6466

Description

Openswan 2.6.39 and earlier allows remote attackers to cause a denial of service (NULL pointer dereference and IKE daemon restart) via IKEv2 packets that lack expected payloads.

Affected products

76
  • Xelerance/Openswan76 versions
    cpe:2.3:a:xelerance:openswan:2.4.7:*:*:*:*:*:*:*+ 75 more
    • cpe:2.3:a:xelerance:openswan:2.4.7:*:*:*:*:*:*:*
    • cpe:2.3:a:xelerance:openswan:2.4.8:*:*:*:*:*:*:*
    • cpe:2.3:a:xelerance:openswan:2.4.9:*:*:*:*:*:*:*
    • cpe:2.3:a:xelerance:openswan:2.4.10:*:*:*:*:*:*:*
    • cpe:2.3:a:xelerance:openswan:2.4.11:*:*:*:*:*:*:*
    • cpe:2.3:a:xelerance:openswan:2.4.12:*:*:*:*:*:*:*
    • cpe:2.3:a:xelerance:openswan:2.4.13:*:*:*:*:*:*:*
    • cpe:2.3:a:xelerance:openswan:2.5.0:*:*:*:*:*:*:*
    • cpe:2.3:a:xelerance:openswan:2.5.0:sbs4:*:*:*:*:*:*
    • cpe:2.3:a:xelerance:openswan:2.5.0:sbs5:*:*:*:*:*:*
    • cpe:2.3:a:xelerance:openswan:2.5.01:*:*:*:*:*:*:*
    • cpe:2.3:a:xelerance:openswan:2.5.02:*:*:*:*:*:*:*
    • cpe:2.3:a:xelerance:openswan:2.5.03:*:*:*:*:*:*:*
    • cpe:2.3:a:xelerance:openswan:2.5.04:*:*:*:*:*:*:*
    • cpe:2.3:a:xelerance:openswan:2.5.05:*:*:*:*:*:*:*
    • cpe:2.3:a:xelerance:openswan:2.5.06:*:*:*:*:*:*:*
    • cpe:2.3:a:xelerance:openswan:2.5.07:*:*:*:*:*:*:*
    • cpe:2.3:a:xelerance:openswan:2.5.08:*:*:*:*:*:*:*
    • cpe:2.3:a:xelerance:openswan:2.5.09:*:*:*:*:*:*:*
    • cpe:2.3:a:xelerance:openswan:2.5.10:*:*:*:*:*:*:*
    • cpe:2.3:a:xelerance:openswan:2.5.11:*:*:*:*:*:*:*
    • cpe:2.3:a:xelerance:openswan:2.5.12:*:*:*:*:*:*:*
    • cpe:2.3:a:xelerance:openswan:2.5.13:*:*:*:*:*:*:*
    • cpe:2.3:a:xelerance:openswan:2.5.14:*:*:*:*:*:*:*
    • cpe:2.3:a:xelerance:openswan:2.5.15:*:*:*:*:*:*:*
    • cpe:2.3:a:xelerance:openswan:*:*:*:*:*:*:*:*range: <=2.6.39
    • cpe:2.3:a:xelerance:openswan:2.3.0:*:*:*:*:*:*:*
    • cpe:2.3:a:xelerance:openswan:2.3.1:*:*:*:*:*:*:*
    • cpe:2.3:a:xelerance:openswan:2.4.0:*:*:*:*:*:*:*
    • cpe:2.3:a:xelerance:openswan:2.4.1:*:*:*:*:*:*:*
    • cpe:2.3:a:xelerance:openswan:2.4.2:*:*:*:*:*:*:*
    • cpe:2.3:a:xelerance:openswan:2.4.3:*:*:*:*:*:*:*
    • cpe:2.3:a:xelerance:openswan:2.4.4:*:*:*:*:*:*:*
    • cpe:2.3:a:xelerance:openswan:2.4.5:*:*:*:*:*:*:*
    • cpe:2.3:a:xelerance:openswan:2.4.6:*:*:*:*:*:*:*
    • cpe:2.3:a:xelerance:openswan:2.5.16:*:*:*:*:*:*:*
    • cpe:2.3:a:xelerance:openswan:2.5.17:*:*:*:*:*:*:*
    • cpe:2.3:a:xelerance:openswan:2.5.18:*:*:*:*:*:*:*
    • cpe:2.3:a:xelerance:openswan:2.6.01:*:*:*:*:*:*:*
    • cpe:2.3:a:xelerance:openswan:2.6.02:*:*:*:*:*:*:*
    • cpe:2.3:a:xelerance:openswan:2.6.03:*:*:*:*:*:*:*
    • cpe:2.3:a:xelerance:openswan:2.6.04:*:*:*:*:*:*:*
    • cpe:2.3:a:xelerance:openswan:2.6.05:*:*:*:*:*:*:*
    • cpe:2.3:a:xelerance:openswan:2.6.06:*:*:*:*:*:*:*
    • cpe:2.3:a:xelerance:openswan:2.6.07:*:*:*:*:*:*:*
    • cpe:2.3:a:xelerance:openswan:2.6.08:*:*:*:*:*:*:*
    • cpe:2.3:a:xelerance:openswan:2.6.09:*:*:*:*:*:*:*
    • cpe:2.3:a:xelerance:openswan:2.6.10:*:*:*:*:*:*:*
    • cpe:2.3:a:xelerance:openswan:2.6.11:*:*:*:*:*:*:*
    • cpe:2.3:a:xelerance:openswan:2.6.12:*:*:*:*:*:*:*
    • cpe:2.3:a:xelerance:openswan:2.6.13:*:*:*:*:*:*:*
    • cpe:2.3:a:xelerance:openswan:2.6.14:*:*:*:*:*:*:*
    • cpe:2.3:a:xelerance:openswan:2.6.15:*:*:*:*:*:*:*
    • cpe:2.3:a:xelerance:openswan:2.6.16:*:*:*:*:*:*:*
    • cpe:2.3:a:xelerance:openswan:2.6.17:*:*:*:*:*:*:*
    • cpe:2.3:a:xelerance:openswan:2.6.18:*:*:*:*:*:*:*
    • cpe:2.3:a:xelerance:openswan:2.6.19:*:*:*:*:*:*:*
    • cpe:2.3:a:xelerance:openswan:2.6.20:*:*:*:*:*:*:*
    • cpe:2.3:a:xelerance:openswan:2.6.21:*:*:*:*:*:*:*
    • cpe:2.3:a:xelerance:openswan:2.6.22:*:*:*:*:*:*:*
    • cpe:2.3:a:xelerance:openswan:2.6.23:*:*:*:*:*:*:*
    • cpe:2.3:a:xelerance:openswan:2.6.24:*:*:*:*:*:*:*
    • cpe:2.3:a:xelerance:openswan:2.6.25:*:*:*:*:*:*:*
    • cpe:2.3:a:xelerance:openswan:2.6.26:*:*:*:*:*:*:*
    • cpe:2.3:a:xelerance:openswan:2.6.27:*:*:*:*:*:*:*
    • cpe:2.3:a:xelerance:openswan:2.6.28:*:*:*:*:*:*:*
    • cpe:2.3:a:xelerance:openswan:2.6.29:*:*:*:*:*:*:*
    • cpe:2.3:a:xelerance:openswan:2.6.30:*:*:*:*:*:*:*
    • cpe:2.3:a:xelerance:openswan:2.6.31:*:*:*:*:*:*:*
    • cpe:2.3:a:xelerance:openswan:2.6.32:*:*:*:*:*:*:*
    • cpe:2.3:a:xelerance:openswan:2.6.33:*:*:*:*:*:*:*
    • cpe:2.3:a:xelerance:openswan:2.6.34:*:*:*:*:*:*:*
    • cpe:2.3:a:xelerance:openswan:2.6.35:*:*:*:*:*:*:*
    • cpe:2.3:a:xelerance:openswan:2.6.36:*:*:*:*:*:*:*
    • cpe:2.3:a:xelerance:openswan:2.6.37:*:*:*:*:*:*:*
    • cpe:2.3:a:xelerance:openswan:2.6.38:*:*:*:*:*:*:*

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

6

News mentions

0

No linked articles in our index yet.