ID CVE-2013-6466
Summary Openswan 2.6.39 and earlier allows remote attackers to cause a denial of service (NULL pointer dereference and IKE daemon restart) via IKEv2 packets that lack expected payloads. Per: http://cwe.mitre.org/data/definitions/476.html "CWE-476: NULL Pointer Dereference"
References
Vulnerable Configurations
  • cpe:2.3:a:xelerance:openswan:2.3.0:*:*:*:*:*:*:*
    cpe:2.3:a:xelerance:openswan:2.3.0:*:*:*:*:*:*:*
  • cpe:2.3:a:xelerance:openswan:2.3.1:*:*:*:*:*:*:*
    cpe:2.3:a:xelerance:openswan:2.3.1:*:*:*:*:*:*:*
  • cpe:2.3:a:xelerance:openswan:2.4.0:*:*:*:*:*:*:*
    cpe:2.3:a:xelerance:openswan:2.4.0:*:*:*:*:*:*:*
  • cpe:2.3:a:xelerance:openswan:2.4.1:*:*:*:*:*:*:*
    cpe:2.3:a:xelerance:openswan:2.4.1:*:*:*:*:*:*:*
  • cpe:2.3:a:xelerance:openswan:2.4.2:*:*:*:*:*:*:*
    cpe:2.3:a:xelerance:openswan:2.4.2:*:*:*:*:*:*:*
  • cpe:2.3:a:xelerance:openswan:2.4.3:*:*:*:*:*:*:*
    cpe:2.3:a:xelerance:openswan:2.4.3:*:*:*:*:*:*:*
  • cpe:2.3:a:xelerance:openswan:2.4.4:*:*:*:*:*:*:*
    cpe:2.3:a:xelerance:openswan:2.4.4:*:*:*:*:*:*:*
  • cpe:2.3:a:xelerance:openswan:2.4.5:*:*:*:*:*:*:*
    cpe:2.3:a:xelerance:openswan:2.4.5:*:*:*:*:*:*:*
  • cpe:2.3:a:xelerance:openswan:2.4.6:*:*:*:*:*:*:*
    cpe:2.3:a:xelerance:openswan:2.4.6:*:*:*:*:*:*:*
  • cpe:2.3:a:xelerance:openswan:2.4.7:*:*:*:*:*:*:*
    cpe:2.3:a:xelerance:openswan:2.4.7:*:*:*:*:*:*:*
  • cpe:2.3:a:xelerance:openswan:2.4.8:*:*:*:*:*:*:*
    cpe:2.3:a:xelerance:openswan:2.4.8:*:*:*:*:*:*:*
  • cpe:2.3:a:xelerance:openswan:2.4.9:*:*:*:*:*:*:*
    cpe:2.3:a:xelerance:openswan:2.4.9:*:*:*:*:*:*:*
  • cpe:2.3:a:xelerance:openswan:2.4.10:*:*:*:*:*:*:*
    cpe:2.3:a:xelerance:openswan:2.4.10:*:*:*:*:*:*:*
  • cpe:2.3:a:xelerance:openswan:2.4.11:*:*:*:*:*:*:*
    cpe:2.3:a:xelerance:openswan:2.4.11:*:*:*:*:*:*:*
  • cpe:2.3:a:xelerance:openswan:2.4.12:*:*:*:*:*:*:*
    cpe:2.3:a:xelerance:openswan:2.4.12:*:*:*:*:*:*:*
  • cpe:2.3:a:xelerance:openswan:2.4.13:*:*:*:*:*:*:*
    cpe:2.3:a:xelerance:openswan:2.4.13:*:*:*:*:*:*:*
  • cpe:2.3:a:xelerance:openswan:2.5.0:*:*:*:*:*:*:*
    cpe:2.3:a:xelerance:openswan:2.5.0:*:*:*:*:*:*:*
  • cpe:2.3:a:xelerance:openswan:2.5.0:sbs4:*:*:*:*:*:*
    cpe:2.3:a:xelerance:openswan:2.5.0:sbs4:*:*:*:*:*:*
  • cpe:2.3:a:xelerance:openswan:2.5.0:sbs5:*:*:*:*:*:*
    cpe:2.3:a:xelerance:openswan:2.5.0:sbs5:*:*:*:*:*:*
  • cpe:2.3:a:xelerance:openswan:2.5.01:*:*:*:*:*:*:*
    cpe:2.3:a:xelerance:openswan:2.5.01:*:*:*:*:*:*:*
  • cpe:2.3:a:xelerance:openswan:2.5.02:*:*:*:*:*:*:*
    cpe:2.3:a:xelerance:openswan:2.5.02:*:*:*:*:*:*:*
  • cpe:2.3:a:xelerance:openswan:2.5.03:*:*:*:*:*:*:*
    cpe:2.3:a:xelerance:openswan:2.5.03:*:*:*:*:*:*:*
  • cpe:2.3:a:xelerance:openswan:2.5.04:*:*:*:*:*:*:*
    cpe:2.3:a:xelerance:openswan:2.5.04:*:*:*:*:*:*:*
  • cpe:2.3:a:xelerance:openswan:2.5.05:*:*:*:*:*:*:*
    cpe:2.3:a:xelerance:openswan:2.5.05:*:*:*:*:*:*:*
  • cpe:2.3:a:xelerance:openswan:2.5.06:*:*:*:*:*:*:*
    cpe:2.3:a:xelerance:openswan:2.5.06:*:*:*:*:*:*:*
  • cpe:2.3:a:xelerance:openswan:2.5.07:*:*:*:*:*:*:*
    cpe:2.3:a:xelerance:openswan:2.5.07:*:*:*:*:*:*:*
  • cpe:2.3:a:xelerance:openswan:2.5.08:*:*:*:*:*:*:*
    cpe:2.3:a:xelerance:openswan:2.5.08:*:*:*:*:*:*:*
  • cpe:2.3:a:xelerance:openswan:2.5.09:*:*:*:*:*:*:*
    cpe:2.3:a:xelerance:openswan:2.5.09:*:*:*:*:*:*:*
  • cpe:2.3:a:xelerance:openswan:2.5.10:*:*:*:*:*:*:*
    cpe:2.3:a:xelerance:openswan:2.5.10:*:*:*:*:*:*:*
  • cpe:2.3:a:xelerance:openswan:2.5.11:*:*:*:*:*:*:*
    cpe:2.3:a:xelerance:openswan:2.5.11:*:*:*:*:*:*:*
  • cpe:2.3:a:xelerance:openswan:2.5.12:*:*:*:*:*:*:*
    cpe:2.3:a:xelerance:openswan:2.5.12:*:*:*:*:*:*:*
  • cpe:2.3:a:xelerance:openswan:2.5.13:*:*:*:*:*:*:*
    cpe:2.3:a:xelerance:openswan:2.5.13:*:*:*:*:*:*:*
  • cpe:2.3:a:xelerance:openswan:2.5.14:*:*:*:*:*:*:*
    cpe:2.3:a:xelerance:openswan:2.5.14:*:*:*:*:*:*:*
  • cpe:2.3:a:xelerance:openswan:2.5.15:*:*:*:*:*:*:*
    cpe:2.3:a:xelerance:openswan:2.5.15:*:*:*:*:*:*:*
  • cpe:2.3:a:xelerance:openswan:2.5.16:*:*:*:*:*:*:*
    cpe:2.3:a:xelerance:openswan:2.5.16:*:*:*:*:*:*:*
  • cpe:2.3:a:xelerance:openswan:2.5.17:*:*:*:*:*:*:*
    cpe:2.3:a:xelerance:openswan:2.5.17:*:*:*:*:*:*:*
  • cpe:2.3:a:xelerance:openswan:2.5.18:*:*:*:*:*:*:*
    cpe:2.3:a:xelerance:openswan:2.5.18:*:*:*:*:*:*:*
  • cpe:2.3:a:xelerance:openswan:2.6.01:*:*:*:*:*:*:*
    cpe:2.3:a:xelerance:openswan:2.6.01:*:*:*:*:*:*:*
  • cpe:2.3:a:xelerance:openswan:2.6.02:*:*:*:*:*:*:*
    cpe:2.3:a:xelerance:openswan:2.6.02:*:*:*:*:*:*:*
  • cpe:2.3:a:xelerance:openswan:2.6.03:*:*:*:*:*:*:*
    cpe:2.3:a:xelerance:openswan:2.6.03:*:*:*:*:*:*:*
  • cpe:2.3:a:xelerance:openswan:2.6.04:*:*:*:*:*:*:*
    cpe:2.3:a:xelerance:openswan:2.6.04:*:*:*:*:*:*:*
  • cpe:2.3:a:xelerance:openswan:2.6.05:*:*:*:*:*:*:*
    cpe:2.3:a:xelerance:openswan:2.6.05:*:*:*:*:*:*:*
  • cpe:2.3:a:xelerance:openswan:2.6.06:*:*:*:*:*:*:*
    cpe:2.3:a:xelerance:openswan:2.6.06:*:*:*:*:*:*:*
  • cpe:2.3:a:xelerance:openswan:2.6.07:*:*:*:*:*:*:*
    cpe:2.3:a:xelerance:openswan:2.6.07:*:*:*:*:*:*:*
  • cpe:2.3:a:xelerance:openswan:2.6.08:*:*:*:*:*:*:*
    cpe:2.3:a:xelerance:openswan:2.6.08:*:*:*:*:*:*:*
  • cpe:2.3:a:xelerance:openswan:2.6.09:*:*:*:*:*:*:*
    cpe:2.3:a:xelerance:openswan:2.6.09:*:*:*:*:*:*:*
  • cpe:2.3:a:xelerance:openswan:2.6.10:*:*:*:*:*:*:*
    cpe:2.3:a:xelerance:openswan:2.6.10:*:*:*:*:*:*:*
  • cpe:2.3:a:xelerance:openswan:2.6.11:*:*:*:*:*:*:*
    cpe:2.3:a:xelerance:openswan:2.6.11:*:*:*:*:*:*:*
  • cpe:2.3:a:xelerance:openswan:2.6.12:*:*:*:*:*:*:*
    cpe:2.3:a:xelerance:openswan:2.6.12:*:*:*:*:*:*:*
  • cpe:2.3:a:xelerance:openswan:2.6.13:*:*:*:*:*:*:*
    cpe:2.3:a:xelerance:openswan:2.6.13:*:*:*:*:*:*:*
  • cpe:2.3:a:xelerance:openswan:2.6.14:*:*:*:*:*:*:*
    cpe:2.3:a:xelerance:openswan:2.6.14:*:*:*:*:*:*:*
  • cpe:2.3:a:xelerance:openswan:2.6.15:*:*:*:*:*:*:*
    cpe:2.3:a:xelerance:openswan:2.6.15:*:*:*:*:*:*:*
  • cpe:2.3:a:xelerance:openswan:2.6.16:*:*:*:*:*:*:*
    cpe:2.3:a:xelerance:openswan:2.6.16:*:*:*:*:*:*:*
  • cpe:2.3:a:xelerance:openswan:2.6.17:*:*:*:*:*:*:*
    cpe:2.3:a:xelerance:openswan:2.6.17:*:*:*:*:*:*:*
  • cpe:2.3:a:xelerance:openswan:2.6.18:*:*:*:*:*:*:*
    cpe:2.3:a:xelerance:openswan:2.6.18:*:*:*:*:*:*:*
  • cpe:2.3:a:xelerance:openswan:2.6.19:*:*:*:*:*:*:*
    cpe:2.3:a:xelerance:openswan:2.6.19:*:*:*:*:*:*:*
  • cpe:2.3:a:xelerance:openswan:2.6.20:*:*:*:*:*:*:*
    cpe:2.3:a:xelerance:openswan:2.6.20:*:*:*:*:*:*:*
  • cpe:2.3:a:xelerance:openswan:2.6.21:*:*:*:*:*:*:*
    cpe:2.3:a:xelerance:openswan:2.6.21:*:*:*:*:*:*:*
  • cpe:2.3:a:xelerance:openswan:2.6.22:*:*:*:*:*:*:*
    cpe:2.3:a:xelerance:openswan:2.6.22:*:*:*:*:*:*:*
  • cpe:2.3:a:xelerance:openswan:2.6.23:*:*:*:*:*:*:*
    cpe:2.3:a:xelerance:openswan:2.6.23:*:*:*:*:*:*:*
  • cpe:2.3:a:xelerance:openswan:2.6.24:*:*:*:*:*:*:*
    cpe:2.3:a:xelerance:openswan:2.6.24:*:*:*:*:*:*:*
  • cpe:2.3:a:xelerance:openswan:2.6.25:*:*:*:*:*:*:*
    cpe:2.3:a:xelerance:openswan:2.6.25:*:*:*:*:*:*:*
  • cpe:2.3:a:xelerance:openswan:2.6.26:*:*:*:*:*:*:*
    cpe:2.3:a:xelerance:openswan:2.6.26:*:*:*:*:*:*:*
  • cpe:2.3:a:xelerance:openswan:2.6.27:*:*:*:*:*:*:*
    cpe:2.3:a:xelerance:openswan:2.6.27:*:*:*:*:*:*:*
  • cpe:2.3:a:xelerance:openswan:2.6.28:*:*:*:*:*:*:*
    cpe:2.3:a:xelerance:openswan:2.6.28:*:*:*:*:*:*:*
  • cpe:2.3:a:xelerance:openswan:2.6.29:*:*:*:*:*:*:*
    cpe:2.3:a:xelerance:openswan:2.6.29:*:*:*:*:*:*:*
  • cpe:2.3:a:xelerance:openswan:2.6.30:*:*:*:*:*:*:*
    cpe:2.3:a:xelerance:openswan:2.6.30:*:*:*:*:*:*:*
  • cpe:2.3:a:xelerance:openswan:2.6.31:*:*:*:*:*:*:*
    cpe:2.3:a:xelerance:openswan:2.6.31:*:*:*:*:*:*:*
  • cpe:2.3:a:xelerance:openswan:2.6.32:*:*:*:*:*:*:*
    cpe:2.3:a:xelerance:openswan:2.6.32:*:*:*:*:*:*:*
  • cpe:2.3:a:xelerance:openswan:2.6.33:*:*:*:*:*:*:*
    cpe:2.3:a:xelerance:openswan:2.6.33:*:*:*:*:*:*:*
  • cpe:2.3:a:xelerance:openswan:2.6.34:*:*:*:*:*:*:*
    cpe:2.3:a:xelerance:openswan:2.6.34:*:*:*:*:*:*:*
  • cpe:2.3:a:xelerance:openswan:2.6.35:*:*:*:*:*:*:*
    cpe:2.3:a:xelerance:openswan:2.6.35:*:*:*:*:*:*:*
  • cpe:2.3:a:xelerance:openswan:2.6.36:*:*:*:*:*:*:*
    cpe:2.3:a:xelerance:openswan:2.6.36:*:*:*:*:*:*:*
  • cpe:2.3:a:xelerance:openswan:2.6.37:*:*:*:*:*:*:*
    cpe:2.3:a:xelerance:openswan:2.6.37:*:*:*:*:*:*:*
  • cpe:2.3:a:xelerance:openswan:2.6.38:*:*:*:*:*:*:*
    cpe:2.3:a:xelerance:openswan:2.6.38:*:*:*:*:*:*:*
  • cpe:2.3:a:xelerance:openswan:0.9.9:*:*:*:*:*:*:*
    cpe:2.3:a:xelerance:openswan:0.9.9:*:*:*:*:*:*:*
  • cpe:2.3:a:xelerance:openswan:2.4:*:*:*:*:*:*:*
    cpe:2.3:a:xelerance:openswan:2.4:*:*:*:*:*:*:*
  • cpe:2.3:a:xelerance:openswan:2.5.00:*:*:*:*:*:*:*
    cpe:2.3:a:xelerance:openswan:2.5.00:*:*:*:*:*:*:*
  • cpe:2.3:a:xelerance:openswan:2.6.39:*:*:*:*:*:*:*
    cpe:2.3:a:xelerance:openswan:2.6.39:*:*:*:*:*:*:*
CVSS
Base: 5.0 (as of 29-07-2019 - 14:24)
Impact:
Exploitability:
CWE NVD-CWE-Other
CAPEC
Access
VectorComplexityAuthentication
NETWORK LOW NONE
Impact
ConfidentialityIntegrityAvailability
NONE NONE PARTIAL
cvss-vector via4 AV:N/AC:L/Au:N/C:N/I:N/A:P
redhat via4
advisories
bugzilla
id 1050277
title CVE-2013-6466 openswan: dereferencing missing IKEv2 payloads causes pluto daemon to restart
oval
OR
  • comment Red Hat Enterprise Linux must be installed
    oval oval:com.redhat.rhba:tst:20070304026
  • AND
    • comment Red Hat Enterprise Linux 5 is installed
      oval oval:com.redhat.rhba:tst:20070331005
    • OR
      • AND
        • comment openswan is earlier than 0:2.6.32-7.3.el5_10
          oval oval:com.redhat.rhsa:tst:20140185001
        • comment openswan is signed with Red Hat redhatrelease key
          oval oval:com.redhat.rhsa:tst:20090402002
      • AND
        • comment openswan-doc is earlier than 0:2.6.32-7.3.el5_10
          oval oval:com.redhat.rhsa:tst:20140185003
        • comment openswan-doc is signed with Red Hat redhatrelease key
          oval oval:com.redhat.rhsa:tst:20090402004
  • AND
    • comment Red Hat Enterprise Linux 6 is installed
      oval oval:com.redhat.rhba:tst:20111656003
    • OR
      • AND
        • comment openswan is earlier than 0:2.6.32-27.2.el6_5
          oval oval:com.redhat.rhsa:tst:20140185006
        • comment openswan is signed with Red Hat redhatrelease2 key
          oval oval:com.redhat.rhsa:tst:20100892002
      • AND
        • comment openswan-doc is earlier than 0:2.6.32-27.2.el6_5
          oval oval:com.redhat.rhsa:tst:20140185008
        • comment openswan-doc is signed with Red Hat redhatrelease2 key
          oval oval:com.redhat.rhsa:tst:20100892004
rhsa
id RHSA-2014:0185
released 2014-02-18
severity Moderate
title RHSA-2014:0185: openswan security update (Moderate)
rpms
  • openswan-0:2.6.32-27.2.el6_5
  • openswan-0:2.6.32-7.3.el5_10
  • openswan-debuginfo-0:2.6.32-27.2.el6_5
  • openswan-debuginfo-0:2.6.32-7.3.el5_10
  • openswan-doc-0:2.6.32-27.2.el6_5
  • openswan-doc-0:2.6.32-7.3.el5_10
refmap via4
bid 65155
confirm https://cert.vde.com/en-us/advisories/vde-2017-001
debian DSA-2893
misc https://libreswan.org/security/CVE-2013-6467/CVE-2013-6467.txt
xf openswan-cve20136466-dos(90524)
Last major update 29-07-2019 - 14:24
Published 26-01-2014 - 20:55
Last modified 29-07-2019 - 14:24
Back to Top