4.3
CVSSv2

CVE-2013-5018

Published: 28/08/2013 Updated: 30/10/2018
CVSS v2 Base Score: 4.3 | Impact Score: 2.9 | Exploitability Score: 8.6
VMScore: 383
Vector: AV:N/AC:M/Au:N/C:N/I:N/A:P

Vulnerability Summary

The is_asn1 function in strongSwan 4.1.11 up to and including 5.0.4 does not properly validate the return value of the asn1_length function, which allows remote malicious users to cause a denial of service (segmentation fault) via a (1) XAuth username, (2) EAP identity, or (3) PEM encoded file that starts with a 0x04, 0x30, or 0x31 character followed by an ASN.1 length value that triggers an integer overflow.

Vulnerable Product Search on Vulmon Subscribe to Product

strongswan strongswan 4.1.11

strongswan strongswan 5.0.2

strongswan strongswan 5.0.1

strongswan strongswan 5.0.3

strongswan strongswan 5.0.4

strongswan strongswan 5.0.0

opensuse opensuse 12.2

opensuse opensuse 12.3

opensuse opensuse 11.4

Vendor Advisories

The is_asn1 function in strongSwan 4111 through 504 does not properly validate the return value of the asn1_length function, which allows remote attackers to cause a denial of service (segmentation fault) via a (1) XAuth username, (2) EAP identity, or (3) PEM encoded file that starts with a 0x04, 0x30, or 0x31 character followed by an ASN1 len ...