CVE-2013-5018

The is_asn1 function in strongSwan 4.1.11 through 5.0.4 does not properly validate the return value of the asn1_length function, which allows remote attackers to cause a denial of service (segmentation fault) via a (1) XAuth username, (2) EAP identity, or (3) PEM encoded file that starts with a 0x04, 0x30, or 0x31 character followed by an ASN.1 length value that triggers an integer overflow.
Configurations

Configuration 1 (hide)

cpe:2.3:a:strongswan:strongswan:4.1.11:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:a:strongswan:strongswan:5.0.0:*:*:*:*:*:*:*
cpe:2.3:a:strongswan:strongswan:5.0.1:*:*:*:*:*:*:*
cpe:2.3:a:strongswan:strongswan:5.0.2:*:*:*:*:*:*:*
cpe:2.3:a:strongswan:strongswan:5.0.3:*:*:*:*:*:*:*
cpe:2.3:a:strongswan:strongswan:5.0.4:*:*:*:*:*:*:*

Configuration 3 (hide)

OR cpe:2.3:o:opensuse:opensuse:11.4:*:*:*:*:*:*:*
cpe:2.3:o:opensuse:opensuse:12.2:*:*:*:*:*:*:*
cpe:2.3:o:opensuse:opensuse:12.3:*:*:*:*:*:*:*

History

No history.

Information

Published : 2013-08-28 23:55

Updated : 2023-12-10 11:16


NVD link : CVE-2013-5018

Mitre link : CVE-2013-5018

CVE.ORG link : CVE-2013-5018


JSON object : View

Products Affected

opensuse

  • opensuse

strongswan

  • strongswan
CWE
CWE-119

Improper Restriction of Operations within the Bounds of a Memory Buffer