Page 4 of 17 results (0.005 seconds)

CVSS: 5.0EPSS: 3%CPEs: 1EXPL: 0

Libreswan 3.6 allows remote attackers to cause a denial of service (crash) via a small length value and (1) no version or (2) an invalid major number in an IKE packet. Libreswan 3.6 permite a atacantes remotos causar denegación de servicio (caída) a través de un valor de longitud pequeño y (1) ninguna versión o (2) un número mayor inválido en un paquete IKE. • http://lists.fedoraproject.org/pipermail/package-announce/2013-December/124911.html http://lists.fedoraproject.org/pipermail/package-announce/2013-December/124928.html http://lists.fedoraproject.org/pipermail/package-announce/2013-December/124943.html http://secunia.com/advisories/56276 https://libreswan.org/security/CVE-2013-4564/CVE-2013-4564.txt.asc https://lists.libreswan.org/pipermail/swan-announce/2013/000007.html • CWE-189: Numeric Errors •

CVSS: 5.1EPSS: 0%CPEs: 2EXPL: 0

Buffer overflow in the atodn function in libreswan 3.0 and 3.1, when Opportunistic Encryption is enabled and an RSA key is being used, allows remote attackers to cause a denial of service (pluto IKE daemon crash) and possibly execute arbitrary code via crafted DNS TXT records. NOTE: this might be the same vulnerability as CVE-2013-2053 and CVE-2013-2054. Desbordamiento de buffer en la función atodn en libreswan v3.0 y v3.1, cuando está activada Opportunistic Encryptiony se usa una clave RSA, permite a los atacantes remotos provocar una denegación de servicio (caída del demonio IKE)y posiblemente ejecutar código a través de registros DNS TXT. Nota: esta podría ser la misma vulnerabilidad que CVE-2013-2052 y CVE-2013-2054. • https://libreswan.org/security/CVE-2013-2052/CVE-2013-2052.txt https://lists.libreswan.org/pipermail/swan-announce/2013/000003.html • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •