// For flags

CVE-2013-5018

 

Severity Score

4.3
*CVSS v2

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

1
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

The is_asn1 function in strongSwan 4.1.11 through 5.0.4 does not properly validate the return value of the asn1_length function, which allows remote attackers to cause a denial of service (segmentation fault) via a (1) XAuth username, (2) EAP identity, or (3) PEM encoded file that starts with a 0x04, 0x30, or 0x31 character followed by an ASN.1 length value that triggers an integer overflow.

La función is_asn1 en strongSwan v4.1.11 hasta v5.0.4 no valida correctamente el valor de retorno de la función asn1_length, lo que permite a atacantes remotos provocar una denegación de servicio (corrupción de memoria) a través de (1) nombre de usuario XAuth, (2) identidad EAP, o (3) la codificación PEM de un fichero que comienza con los caracteres "0x04, 0x30, o 0x31" seguidos por un valor de tamaño ASN.1 que dispara un desbordamiento de enteros.

*Credits: N/A
CVSS Scores
Attack Vector
Network
Attack Complexity
Medium
Authentication
None
Confidentiality
None
Integrity
None
Availability
Partial
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2013-07-30 CVE Reserved
  • 2013-08-28 CVE Published
  • 2024-05-15 EPSS Updated
  • 2024-08-06 CVE Updated
  • 2024-08-06 First Exploit
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
CWE
  • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Strongswan
Search vendor "Strongswan"
Strongswan
Search vendor "Strongswan" for product "Strongswan"
4.1.11
Search vendor "Strongswan" for product "Strongswan" and version "4.1.11"
-
Affected
Strongswan
Search vendor "Strongswan"
Strongswan
Search vendor "Strongswan" for product "Strongswan"
5.0.0
Search vendor "Strongswan" for product "Strongswan" and version "5.0.0"
-
Affected
Strongswan
Search vendor "Strongswan"
Strongswan
Search vendor "Strongswan" for product "Strongswan"
5.0.1
Search vendor "Strongswan" for product "Strongswan" and version "5.0.1"
-
Affected
Strongswan
Search vendor "Strongswan"
Strongswan
Search vendor "Strongswan" for product "Strongswan"
5.0.2
Search vendor "Strongswan" for product "Strongswan" and version "5.0.2"
-
Affected
Strongswan
Search vendor "Strongswan"
Strongswan
Search vendor "Strongswan" for product "Strongswan"
5.0.3
Search vendor "Strongswan" for product "Strongswan" and version "5.0.3"
-
Affected
Strongswan
Search vendor "Strongswan"
Strongswan
Search vendor "Strongswan" for product "Strongswan"
5.0.4
Search vendor "Strongswan" for product "Strongswan" and version "5.0.4"
-
Affected
Opensuse
Search vendor "Opensuse"
Opensuse
Search vendor "Opensuse" for product "Opensuse"
11.4
Search vendor "Opensuse" for product "Opensuse" and version "11.4"
-
Affected
Opensuse
Search vendor "Opensuse"
Opensuse
Search vendor "Opensuse" for product "Opensuse"
12.2
Search vendor "Opensuse" for product "Opensuse" and version "12.2"
-
Affected
Opensuse
Search vendor "Opensuse"
Opensuse
Search vendor "Opensuse" for product "Opensuse"
12.3
Search vendor "Opensuse" for product "Opensuse" and version "12.3"
-
Affected