Vulnerability Details : CVE-2013-6466
Openswan 2.6.39 and earlier allows remote attackers to cause a denial of service (NULL pointer dereference and IKE daemon restart) via IKEv2 packets that lack expected payloads.
Vulnerability category: Memory CorruptionDenial of service
Exploit prediction scoring system (EPSS) score for CVE-2013-6466
Probability of exploitation activity in the next 30 days: 2.35%
Percentile, the proportion of vulnerabilities that are scored at or less: ~ 88 % EPSS Score History EPSS FAQ
CVSS scores for CVE-2013-6466
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source |
---|---|---|---|---|---|
5.0
|
MEDIUM | AV:N/AC:L/Au:N/C:N/I:N/A:P |
10.0
|
2.9
|
NIST |
References for CVE-2013-6466
-
http://rhn.redhat.com/errata/RHSA-2014-0185.html
RHSA-2014:0185 - Security Advisory - Red Hat Customer Portal
-
http://www.securityfocus.com/bid/65155
Openswan IKEv2 payloads Remote Denial Of Service Vulnerability
-
https://libreswan.org/security/CVE-2013-6467/CVE-2013-6467.txt
Vendor Advisory
-
https://cert.vde.com/en-us/advisories/vde-2017-001
PHOENIX CONTACT mGuard IKE daemon remote denial of service — English (USA)
-
https://exchange.xforce.ibmcloud.com/vulnerabilities/90524
Openswan IKEv2 payloads denial of service CVE-2013-6466 Vulnerability Report
-
http://www.debian.org/security/2014/dsa-2893
Debian -- Security Information -- DSA-2893-1 openswan
Products affected by CVE-2013-6466
- cpe:2.3:a:xelerance:openswan:*:*:*:*:*:*:*:*
- cpe:2.3:a:xelerance:openswan:2.3.0:*:*:*:*:*:*:*
- cpe:2.3:a:xelerance:openswan:2.4.0:*:*:*:*:*:*:*
- cpe:2.3:a:xelerance:openswan:2.4.2:*:*:*:*:*:*:*
- cpe:2.3:a:xelerance:openswan:2.3.1:*:*:*:*:*:*:*
- cpe:2.3:a:xelerance:openswan:2.6.04:*:*:*:*:*:*:*
- cpe:2.3:a:xelerance:openswan:2.6.05:*:*:*:*:*:*:*
- cpe:2.3:a:xelerance:openswan:2.6.12:*:*:*:*:*:*:*
- cpe:2.3:a:xelerance:openswan:2.6.13:*:*:*:*:*:*:*
- cpe:2.3:a:xelerance:openswan:2.4.5:*:*:*:*:*:*:*
- cpe:2.3:a:xelerance:openswan:2.4.9:*:*:*:*:*:*:*
- cpe:2.3:a:xelerance:openswan:2.6.03:*:*:*:*:*:*:*
- cpe:2.3:a:xelerance:openswan:2.6.10:*:*:*:*:*:*:*
- cpe:2.3:a:xelerance:openswan:2.6.11:*:*:*:*:*:*:*
- cpe:2.3:a:xelerance:openswan:2.4.10:*:*:*:*:*:*:*
- cpe:2.3:a:xelerance:openswan:2.4.1:*:*:*:*:*:*:*
- cpe:2.3:a:xelerance:openswan:2.4.3:*:*:*:*:*:*:*
- cpe:2.3:a:xelerance:openswan:2.4.12:*:*:*:*:*:*:*
- cpe:2.3:a:xelerance:openswan:2.6.08:*:*:*:*:*:*:*
- cpe:2.3:a:xelerance:openswan:2.6.09:*:*:*:*:*:*:*
- cpe:2.3:a:xelerance:openswan:2.6.16:*:*:*:*:*:*:*
- cpe:2.3:a:xelerance:openswan:2.4.4:*:*:*:*:*:*:*
- cpe:2.3:a:xelerance:openswan:2.4.8:*:*:*:*:*:*:*
- cpe:2.3:a:xelerance:openswan:2.4.11:*:*:*:*:*:*:*
- cpe:2.3:a:xelerance:openswan:2.6.06:*:*:*:*:*:*:*
- cpe:2.3:a:xelerance:openswan:2.6.07:*:*:*:*:*:*:*
- cpe:2.3:a:xelerance:openswan:2.6.14:*:*:*:*:*:*:*
- cpe:2.3:a:xelerance:openswan:2.6.15:*:*:*:*:*:*:*
- cpe:2.3:a:xelerance:openswan:2.4.6:*:*:*:*:*:*:*
- cpe:2.3:a:xelerance:openswan:2.4.7:*:*:*:*:*:*:*
- cpe:2.3:a:xelerance:openswan:2.6.17:*:*:*:*:*:*:*
- cpe:2.3:a:xelerance:openswan:2.6.18:*:*:*:*:*:*:*
- cpe:2.3:a:xelerance:openswan:2.6.19:*:*:*:*:*:*:*
- cpe:2.3:a:xelerance:openswan:2.6.20:*:*:*:*:*:*:*
- cpe:2.3:a:xelerance:openswan:2.6.28:*:*:*:*:*:*:*
- cpe:2.3:a:xelerance:openswan:2.6.25:*:*:*:*:*:*:*
- cpe:2.3:a:xelerance:openswan:2.6.26:*:*:*:*:*:*:*
- cpe:2.3:a:xelerance:openswan:2.6.27:*:*:*:*:*:*:*
- cpe:2.3:a:xelerance:openswan:2.6.34:*:*:*:*:*:*:*
- cpe:2.3:a:xelerance:openswan:2.6.35:*:*:*:*:*:*:*
- cpe:2.3:a:xelerance:openswan:2.6.29:*:*:*:*:*:*:*
- cpe:2.3:a:xelerance:openswan:2.6.32:*:*:*:*:*:*:*
- cpe:2.3:a:xelerance:openswan:2.6.33:*:*:*:*:*:*:*
- cpe:2.3:a:xelerance:openswan:2.6.30:*:*:*:*:*:*:*
- cpe:2.3:a:xelerance:openswan:2.6.31:*:*:*:*:*:*:*
- cpe:2.3:a:xelerance:openswan:2.5.0:*:*:*:*:*:*:*
- cpe:2.3:a:xelerance:openswan:2.5.12:*:*:*:*:*:*:*
- cpe:2.3:a:xelerance:openswan:2.5.13:*:*:*:*:*:*:*
- cpe:2.3:a:xelerance:openswan:2.5.14:*:*:*:*:*:*:*
- cpe:2.3:a:xelerance:openswan:2.5.15:*:*:*:*:*:*:*
- cpe:2.3:a:xelerance:openswan:2.5.0:sbs5:*:*:*:*:*:*
- cpe:2.3:a:xelerance:openswan:2.5.04:*:*:*:*:*:*:*
- cpe:2.3:a:xelerance:openswan:2.5.05:*:*:*:*:*:*:*
- cpe:2.3:a:xelerance:openswan:2.5.06:*:*:*:*:*:*:*
- cpe:2.3:a:xelerance:openswan:2.5.16:*:*:*:*:*:*:*
- cpe:2.3:a:xelerance:openswan:2.6.22:*:*:*:*:*:*:*
- cpe:2.3:a:xelerance:openswan:2.6.21:*:*:*:*:*:*:*
- cpe:2.3:a:xelerance:openswan:2.5.01:*:*:*:*:*:*:*
- cpe:2.3:a:xelerance:openswan:2.5.03:*:*:*:*:*:*:*
- cpe:2.3:a:xelerance:openswan:2.5.08:*:*:*:*:*:*:*
- cpe:2.3:a:xelerance:openswan:2.5.10:*:*:*:*:*:*:*
- cpe:2.3:a:xelerance:openswan:2.6.01:*:*:*:*:*:*:*
- cpe:2.3:a:xelerance:openswan:2.5.17:*:*:*:*:*:*:*
- cpe:2.3:a:xelerance:openswan:2.6.36:*:*:*:*:*:*:*
- cpe:2.3:a:xelerance:openswan:2.6.24:*:*:*:*:*:*:*
- cpe:2.3:a:xelerance:openswan:2.6.23:*:*:*:*:*:*:*
- cpe:2.3:a:xelerance:openswan:2.5.02:*:*:*:*:*:*:*
- cpe:2.3:a:xelerance:openswan:2.5.0:sbs4:*:*:*:*:*:*
- cpe:2.3:a:xelerance:openswan:2.5.07:*:*:*:*:*:*:*
- cpe:2.3:a:xelerance:openswan:2.5.09:*:*:*:*:*:*:*
- cpe:2.3:a:xelerance:openswan:2.5.11:*:*:*:*:*:*:*
- cpe:2.3:a:xelerance:openswan:2.6.02:*:*:*:*:*:*:*
- cpe:2.3:a:xelerance:openswan:2.5.18:*:*:*:*:*:*:*
- cpe:2.3:a:xelerance:openswan:2.4.13:*:*:*:*:*:*:*
- cpe:2.3:a:xelerance:openswan:2.6.37:*:*:*:*:*:*:*
- cpe:2.3:a:xelerance:openswan:2.6.38:*:*:*:*:*:*:*