CVE-2013-6075
SUSE Linux Enterprise Desktop 11 SP2,SUSE Linux Enterprise Desktop 11 SP3,SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T,SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit,SUSE Linux Enterprise Server 10 SP4 LTSS for x86,SUSE Linux Enterprise Server 11 SP2,SUSE Linux Enterprise Server 11 SP2 for VMware,SUSE Linux Enterprise Server 11 SP3,SUSE Linux Enterprise Server 11 SP3 for VMware
CVE-2013-6075, security advisory, novell, suse linux, suse, security, cve

CVE-2013-6075

Common Vulnerabilities and Exposures

[Previous] [Index] [Next]

Upstream information

CVE-2013-6075 at MITRE

Description

The compare_dn function in utils/identification.c in strongSwan 4.3.3 through 5.1.1 allows (1) remote attackers to cause a denial of service (out-of-bounds read, NULL pointer dereference, and daemon crash) or (2) remote authenticated users to impersonate arbitrary users and bypass access restrictions via a crafted ID_DER_ASN1_DN ID, related to an "insufficient length check" during identity comparison.

SUSE information

CVSS v2 Scores
  National Vulnerability Database
Base Score 4.96
Vector AV:N/AC:L/Au:N/C:N/I:N/A:P
Access Vector Network
Access Complexity Low
Authentication None
Confidentiality Impact None
Integrity Impact None
Availability Impact Partial
SUSE Bugzilla entry: 847506 [RESOLVED / FIXED]

SUSE Security Advisories:

List of released packages

Product(s) Fixed package version(s) References
SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T
SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit
SUSE Linux Enterprise Server 10 SP4 LTSS for x86
  • strongswan >= 4.4.0-6.15.1
  • strongswan-doc >= 4.4.0-6.15.1
Builds
ZYPP Patch Nr: 8728
SUSE Linux Enterprise Desktop 11 SP3
SUSE Linux Enterprise Server 11 SP3
SUSE Linux Enterprise Server 11 SP3 for VMware
  • strongswan >= 4.4.0-6.21.1
  • strongswan-doc >= 4.4.0-6.21.1
Builds
SAT Patch Nr: 8488
SUSE Linux Enterprise Desktop 11 SP2
SUSE Linux Enterprise Server 11 SP2
SUSE Linux Enterprise Server 11 SP2 for VMware
  • strongswan >= 4.4.0-6.21.1
  • strongswan-doc >= 4.4.0-6.21.1
Builds
SAT Patch Nr: 8489
openSUSE 12.3
  • strongswan >= 5.0.1-4.12.1
  • strongswan-debugsource >= 5.0.1-4.12.1
  • strongswan-doc >= 5.0.1-4.12.1
  • strongswan-ipsec >= 5.0.1-4.12.1
  • strongswan-ipsec-debuginfo >= 5.0.1-4.12.1
  • strongswan-libs0 >= 5.0.1-4.12.1
  • strongswan-libs0-debuginfo >= 5.0.1-4.12.1
  • strongswan-mysql >= 5.0.1-4.12.1
  • strongswan-mysql-debuginfo >= 5.0.1-4.12.1
  • strongswan-nm >= 5.0.1-4.12.1
  • strongswan-nm-debuginfo >= 5.0.1-4.12.1
  • strongswan-sqlite >= 5.0.1-4.12.1
  • strongswan-sqlite-debuginfo >= 5.0.1-4.12.1
Patchnames:
openSUSE-2013-826
openSUSE Evergreen 11.4
  • strongswan >= 4.5.0-6.60.1
  • strongswan-debugsource >= 4.5.0-6.60.1
  • strongswan-doc >= 4.5.0-6.60.1
  • strongswan-ikev1 >= 4.5.0-6.60.1
  • strongswan-ikev1-debuginfo >= 4.5.0-6.60.1
  • strongswan-ikev2 >= 4.5.0-6.60.1
  • strongswan-ikev2-debuginfo >= 4.5.0-6.60.1
  • strongswan-ipsec >= 4.5.0-6.60.1
  • strongswan-ipsec-debuginfo >= 4.5.0-6.60.1
  • strongswan-libs0 >= 4.5.0-6.60.1
  • strongswan-libs0-debuginfo >= 4.5.0-6.60.1
  • strongswan-mysql >= 4.5.0-6.60.1
  • strongswan-mysql-debuginfo >= 4.5.0-6.60.1
  • strongswan-nm >= 4.5.0-6.60.1
  • strongswan-nm-debuginfo >= 4.5.0-6.60.1
  • strongswan-sqlite >= 4.5.0-6.60.1
  • strongswan-sqlite-debuginfo >= 4.5.0-6.60.1
Patchnames:
2013-158