Amazon Linux Local Check: ALAS-2013-192

Published: 2015-09-08 11:17:18
CVE Author: NIST National Vulnerability Database

Technical Details:
A buffer overflow flaw was found in Openswan. If Opportunistic Encryption were enabled (oe=yes in /etc/ipsec.conf) and an RSA key configured, an attacker able to cause a system to perform a DNS lookup for an attacker-controlled domain containing malicious records (such as by sending an email that triggers a DKIM or SPF DNS record lookup) could cause Openswan's pluto IKE daemon to crash or, potentially, execute arbitrary code with root privileges. With oe=yes but no RSA key configured, the issue can only be triggered by attackers on the local network who can control the reverse DNS entry of the target system. Opportunistic Encryption is disabled by default. (CVE-2013-2053 )

Recommendations:
Run yum update openswan to update your system.

Solution Type:
Vendor Patch

CVSS Base Vector:
AV:N/AC:M/Au:N/C:P/I:P/A:P

Detection Type:
Linux Distribution Package

Summary:
Amazon Linux Local Security Checks

NIST (National Institute of Standards and Technology) NVD (National Vulnerability Database)

https://nvd.nist.gov/vuln/detail/CVE-2013-2053

CVE Analysis

https://www.mageni.net/cve/CVE-2013-2053

References:

https://alas.aws.amazon.com/ALAS-2013-192.html

Severity
Medium
CVSS Score
6.8
Published
2015-09-08
Modified
2018-10-01
Category
Amazon Linux Local Security Checks

You never have to pay for a vulnerability scanning and management software again.

Tired of paying a subscription 'per asset' or 'per IP'? Well you can officially cancel your current subscription. Mageni provides a free, open source and enterprise-ready vulnerability scanning and management platform which helps you to find, prioritize, remediate and manage your vulnerabilities. It is free and always will be.