Executive Summary

Informations
Name CVE-2013-7294 First vendor Publication 2014-01-16
Vendor Cve Last vendor Modification 2018-01-03

Security-Database Scoring CVSS v3

Cvss vector : N/A
Overall CVSS Score NA
Base Score NA Environmental Score NA
impact SubScore NA Temporal Score NA
Exploitabality Sub Score NA
 
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector : (AV:N/AC:L/Au:N/C:N/I:N/A:P)
Cvss Base Score 5 Attack Range Network
Cvss Impact Score 2.9 Attack Complexity Low
Cvss Expoit Score 10 Authentication None Required
Calculate full CVSS 2.0 Vectors scores

Detail

The ikev2parent_inI1outR1 function in pluto/ikev2_parent.c in libreswan before 3.7 allows remote attackers to cause a denial of service (restart) via an IKEv2 I1 notification without a KE payload.

Original Source

Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7294

CWE : Common Weakness Enumeration

% Id Name
100 % CWE-20 Improper Input Validation

OVAL Definitions

Definition Id: oval:org.mitre.oval:def:25475
 
Oval ID: oval:org.mitre.oval:def:25475
Title: SUSE-SU-2014:0178-1 -- Security update for openswan
Description: This update fixes a Denial of Service (DoS) vulnerability via IKEv2 I1 notifications in openswan. CVE-2013-7294 has been assigned to this issue. Security Issues: * CVE-2013-7294 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7294 >
Family: unix Class: patch
Reference(s): SUSE-SU-2014:0178-1
CVE-2013-7294
Version: 3
Platform(s): SUSE Linux Enterprise Server 11
Product(s): openswan
Definition Synopsis:

CPE : Common Platform Enumeration

TypeDescriptionCount
Application 8

Nessus® Vulnerability Scanner

Date Description
2014-02-01 Name : The remote SuSE 11 host is missing one or more security updates.
File : suse_11_openswan-140121.nasl - Type : ACT_GATHER_INFO

Sources (Detail)

Source Url
CONFIRM https://github.com/libreswan/libreswan/commit/2899351224fe2940aec37d7656e1e39...
MLIST https://lists.libreswan.org/pipermail/swan-announce/2013/000007.html
OSVDB http://www.osvdb.org/101573
SECUNIA http://secunia.com/advisories/56276
http://secunia.com/advisories/56915

Alert History

If you want to see full details history, please login or register.
0
1
2
3
4
5
6
7
8
9
10
11
Date Informations
2021-05-05 01:14:08
  • Multiple Updates
2021-05-04 12:29:11
  • Multiple Updates
2021-04-22 01:35:23
  • Multiple Updates
2020-05-24 01:13:02
  • Multiple Updates
2020-05-23 00:39:06
  • Multiple Updates
2018-01-03 09:21:54
  • Multiple Updates
2016-06-28 22:28:41
  • Multiple Updates
2016-04-26 23:59:40
  • Multiple Updates
2014-02-25 17:20:19
  • Multiple Updates
2014-02-17 11:24:41
  • Multiple Updates
2014-01-17 13:20:25
  • Multiple Updates
2014-01-16 13:19:16
  • First insertion