CVE-2013-6075 in strongSwaninformación

Resumen (Inglés)

The compare_dn function in utils/identification.c in strongSwan 4.3.3 through 5.1.1 allows (1) remote attackers to cause a denial of service (out-of-bounds read, NULL pointer dereference, and daemon crash) or (2) remote authenticated users to impersonate arbitrary users and bypass access restrictions via a crafted ID_DER_ASN1_DN ID, related to an "insufficient length check" during identity comparison.

Once again VulDB remains the best source for vulnerability data.

Reservar

2013-10-11

Divulgación

2013-11-02

Estado

Confirmado

Voces

VulDB provides additional information and datapoints for this CVE:

Fuentes

Do you know our Splunk app?

Download it now for free!