CVE-2013-2944
Gentoo Linux Security Advisory 201309-02
Severity Score
7.5
*CVSS v3
Exploit Likelihood
*EPSS
Affected Versions
*CPE
Public Exploits
0
*Multiple Sources
Exploited in Wild
-
*KEV
Decision
-
*SSVC
Descriptions
strongSwan 4.3.5 through 5.0.3, when using the OpenSSL plugin for ECDSA signature verification, allows remote attackers to authenticate as other users via an invalid signature.
strongSwan v4.3.5 hasta v5.0.3, cuando utiliza el plugin OpenSSL para la verificación de firma ECDSA, permite a atacantes remotos autenticarse como otros usuarios a través de una firma invalida.
Multiple vulnerabilities have been found in strongSwan, possibly allowing remote attackers to authenticate as other users or cause a Denial of Service condition. Versions less than 5.1.0 are affected.
*Credits:
N/A
CVSS Scores
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality
Integrity
Availability
Attack Vector
Attack Complexity
Authentication
Confidentiality
Integrity
Availability
* Common Vulnerability Scoring System
SSVC
- Decision:-
Exploitation
Automatable
Tech. Impact
* Organization's Worst-case Scenario
Timeline
- 2013-04-11 CVE Reserved
- 2013-05-02 CVE Published
- 2024-08-06 CVE Updated
- 2025-03-30 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-287: Improper Authentication
CAPEC
References (7)
URL | Tag | Source |
---|---|---|
http://www.securityfocus.com/bid/59580 | Vdb Entry | |
http://www.strongswan.org/blog/2013/04/30/strongswan-5.0.4-released-%28cve-2013-2944%29.html | X_refsource_confirm |
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
http://download.strongswan.org/patches/10_openssl_ecdsa_signature_patch/strongswan-4.3.5-5.0.3_openssl_ecdsa_signature.patch | 2023-11-07 |
URL | Date | SRC |
---|---|---|
http://lists.opensuse.org/opensuse-updates/2013-05/msg00014.html | 2023-11-07 | |
http://lists.opensuse.org/opensuse-updates/2013-06/msg00010.html | 2023-11-07 | |
http://lists.opensuse.org/opensuse-updates/2013-06/msg00121.html | 2023-11-07 | |
http://www.debian.org/security/2013/dsa-2665 | 2023-11-07 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Strongswan Search vendor "Strongswan" | Strongswan Search vendor "Strongswan" for product "Strongswan" | 4.3.5 Search vendor "Strongswan" for product "Strongswan" and version "4.3.5" | - |
Affected
| ||||||
Strongswan Search vendor "Strongswan" | Strongswan Search vendor "Strongswan" for product "Strongswan" | 4.3.6 Search vendor "Strongswan" for product "Strongswan" and version "4.3.6" | - |
Affected
| ||||||
Strongswan Search vendor "Strongswan" | Strongswan Search vendor "Strongswan" for product "Strongswan" | 4.3.7 Search vendor "Strongswan" for product "Strongswan" and version "4.3.7" | - |
Affected
| ||||||
Strongswan Search vendor "Strongswan" | Strongswan Search vendor "Strongswan" for product "Strongswan" | 4.4.0 Search vendor "Strongswan" for product "Strongswan" and version "4.4.0" | - |
Affected
| ||||||
Strongswan Search vendor "Strongswan" | Strongswan Search vendor "Strongswan" for product "Strongswan" | 4.4.1 Search vendor "Strongswan" for product "Strongswan" and version "4.4.1" | - |
Affected
| ||||||
Strongswan Search vendor "Strongswan" | Strongswan Search vendor "Strongswan" for product "Strongswan" | 4.5.0 Search vendor "Strongswan" for product "Strongswan" and version "4.5.0" | - |
Affected
| ||||||
Strongswan Search vendor "Strongswan" | Strongswan Search vendor "Strongswan" for product "Strongswan" | 4.5.1 Search vendor "Strongswan" for product "Strongswan" and version "4.5.1" | - |
Affected
| ||||||
Strongswan Search vendor "Strongswan" | Strongswan Search vendor "Strongswan" for product "Strongswan" | 4.5.2 Search vendor "Strongswan" for product "Strongswan" and version "4.5.2" | - |
Affected
| ||||||
Strongswan Search vendor "Strongswan" | Strongswan Search vendor "Strongswan" for product "Strongswan" | 4.5.3 Search vendor "Strongswan" for product "Strongswan" and version "4.5.3" | - |
Affected
| ||||||
Strongswan Search vendor "Strongswan" | Strongswan Search vendor "Strongswan" for product "Strongswan" | 4.6.0 Search vendor "Strongswan" for product "Strongswan" and version "4.6.0" | - |
Affected
| ||||||
Strongswan Search vendor "Strongswan" | Strongswan Search vendor "Strongswan" for product "Strongswan" | 4.6.1 Search vendor "Strongswan" for product "Strongswan" and version "4.6.1" | - |
Affected
| ||||||
Strongswan Search vendor "Strongswan" | Strongswan Search vendor "Strongswan" for product "Strongswan" | 4.6.2 Search vendor "Strongswan" for product "Strongswan" and version "4.6.2" | - |
Affected
| ||||||
Strongswan Search vendor "Strongswan" | Strongswan Search vendor "Strongswan" for product "Strongswan" | 4.6.3 Search vendor "Strongswan" for product "Strongswan" and version "4.6.3" | - |
Affected
| ||||||
Strongswan Search vendor "Strongswan" | Strongswan Search vendor "Strongswan" for product "Strongswan" | 4.6.4 Search vendor "Strongswan" for product "Strongswan" and version "4.6.4" | - |
Affected
| ||||||
Strongswan Search vendor "Strongswan" | Strongswan Search vendor "Strongswan" for product "Strongswan" | 5.0.0 Search vendor "Strongswan" for product "Strongswan" and version "5.0.0" | - |
Affected
| ||||||
Strongswan Search vendor "Strongswan" | Strongswan Search vendor "Strongswan" for product "Strongswan" | 5.0.1 Search vendor "Strongswan" for product "Strongswan" and version "5.0.1" | - |
Affected
| ||||||
Strongswan Search vendor "Strongswan" | Strongswan Search vendor "Strongswan" for product "Strongswan" | 5.0.2 Search vendor "Strongswan" for product "Strongswan" and version "5.0.2" | - |
Affected
|