Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
strongswan strongswan 4.3.0 vulnerabilities and exploits
(subscribe to this query)
7.5
CVSSv2
CVE-2010-2628
The IKE daemon in strongSwan 4.3.x prior to 4.3.7 and 4.4.x prior to 4.4.1 does not properly check the return values of snprintf calls, which allows remote malicious users to execute arbitrary code via crafted (1) certificate or (2) identity data that triggers buffer overflows.
Strongswan Strongswan 4.3.3
Strongswan Strongswan 4.3.4
Strongswan Strongswan 4.3.5
Strongswan Strongswan 4.3.0
Strongswan Strongswan 4.3.1
Strongswan Strongswan 4.3.2
Strongswan Strongswan 4.3.6
Strongswan Strongswan 4.4.0
5
CVSSv2
CVE-2009-2661
The asn1_length function in strongSwan 2.8 prior to 2.8.11, 4.2 prior to 4.2.17, and 4.3 prior to 4.3.3 does not properly handle X.509 certificates with crafted Relative Distinguished Names (RDNs), which allows remote malicious users to cause a denial of service (pluto IKE daemon...
Strongswan Strongswan 2.8.5
Strongswan Strongswan 2.8.6
Strongswan Strongswan 4.2.12
Strongswan Strongswan 4.2.0
Strongswan Strongswan 2.8.10
Strongswan Strongswan 4.2.16
Strongswan Strongswan 2.8.3
Strongswan Strongswan 2.8.4
Strongswan Strongswan 4.2.13
Strongswan Strongswan 4.2.14
Strongswan Strongswan 4.3.1
Strongswan Strongswan 4.3.2
Strongswan Strongswan 2.8.1
Strongswan Strongswan 2.8.2
Strongswan Strongswan 4.2.3
Strongswan Strongswan 4.2.15
Strongswan Strongswan 4.2.10
Strongswan Strongswan 4.3.0
Strongswan Strongswan 2.8.0
Strongswan Strongswan 2.8.7
Strongswan Strongswan 2.8.8
Strongswan Strongswan 4.2.2
7.5
CVSSv2
CVE-2012-2388
The GMP Plugin in strongSwan 4.2.0 up to and including 4.6.3 allows remote malicious users to bypass authentication via a (1) empty or (2) zeroed RSA signature, aka "RSA signature verification vulnerability."
Strongswan Strongswan 4.2.16
Strongswan Strongswan 4.2.9
Strongswan Strongswan 4.2.6
Strongswan Strongswan 4.2.15
Strongswan Strongswan 4.2.1
Strongswan Strongswan 4.3.2
Strongswan Strongswan 4.6.0
Strongswan Strongswan 4.6.1
Strongswan Strongswan 4.4.1
Strongswan Strongswan 4.2.11
Strongswan Strongswan 4.2.10
Strongswan Strongswan 4.2.5
Strongswan Strongswan 4.2.0
Strongswan Strongswan 4.3.5
Strongswan Strongswan 4.4.0
Strongswan Strongswan 4.5.1
Strongswan Strongswan 4.5.0
Strongswan Strongswan 4.2.13
Strongswan Strongswan 4.2.12
Strongswan Strongswan 4.2.3
Strongswan Strongswan 4.2.4
Strongswan Strongswan 4.3.4
5
CVSSv2
CVE-2015-8023
The server implementation of the EAP-MSCHAPv2 protocol in the eap-mschapv2 plugin in strongSwan 4.2.12 up to and including 5.x prior to 5.3.4 does not properly validate local state, which allows remote malicious users to bypass authentication via an empty Success message in respo...
Canonical Ubuntu Linux 15.10
Canonical Ubuntu Linux 14.04
Canonical Ubuntu Linux 15.04
Strongswan Strongswan 5.2.3
Strongswan Strongswan 4.3.7
Strongswan Strongswan 4.2.12
Strongswan Strongswan 5.1.2
Strongswan Strongswan 4.2.16
Strongswan Strongswan 4.5.3
Strongswan Strongswan 4.5.2
Strongswan Strongswan 5.0.1
Strongswan Strongswan 5.3.2
Strongswan Strongswan 4.4.0
Strongswan Strongswan 5.2.2
Strongswan Strongswan 5.1.0
Strongswan Strongswan 4.5.1
Strongswan Strongswan 4.2.14
Strongswan Strongswan 4.3.5
Strongswan Strongswan 5.2.0
Strongswan Strongswan 5.1.3
Strongswan Strongswan 4.3.2
Strongswan Strongswan 4.6.4
2.6
CVSSv2
CVE-2015-4171
strongSwan 4.3.0 up to and including 5.x prior to 5.3.2 and strongSwan VPN Client prior to 1.4.6, when using EAP or pre-shared keys for authenticating an IKEv2 connection, does not enforce server authentication restrictions until the entire authentication process is complete, whi...
Strongswan Strongswan Vpn Client
Debian Debian Linux 8.0
Canonical Ubuntu Linux 15.04
Canonical Ubuntu Linux 14.10
Canonical Ubuntu Linux 14.04
Strongswan Strongswan 4.3.0
Strongswan Strongswan 4.3.7
Strongswan Strongswan 4.4.0
Strongswan Strongswan 4.6.1
Strongswan Strongswan 4.6.2
Strongswan Strongswan 5.1.0
Strongswan Strongswan 5.1.1
Strongswan Strongswan 5.3.0
Strongswan Strongswan 5.3.1
Strongswan Strongswan 4.3.3
Strongswan Strongswan 4.3.4
Strongswan Strongswan 4.5.1
Strongswan Strongswan 4.5.2
Strongswan Strongswan 5.0.0
Strongswan Strongswan 5.0.1
Strongswan Strongswan 5.2.0
Strongswan Strongswan 5.2.1
6.4
CVSSv2
CVE-2014-2338
IKEv2 in strongSwan 4.0.7 prior to 5.1.3 allows remote malicious users to bypass authentication by rekeying an IKE_SA during (1) initiation or (2) re-authentication, which triggers the IKE_SA state to be set to established.
Strongswan Strongswan 5.1.2
Strongswan Strongswan 5.1.1
Strongswan Strongswan 4.6.0
Strongswan Strongswan 4.6.1
Strongswan Strongswan 4.5.3
Strongswan Strongswan 4.4.0
Strongswan Strongswan 5.0.1
Strongswan Strongswan 5.0.2
Strongswan Strongswan 4.6.4
Strongswan Strongswan 4.5.0
Strongswan Strongswan 4.3.2
Strongswan Strongswan 4.3.3
Strongswan Strongswan 4.2.10
Strongswan Strongswan 4.2.11
Strongswan Strongswan 4.3.6
Strongswan Strongswan 4.3.7
Strongswan Strongswan 4.2.14
Strongswan Strongswan 4.2.15
Strongswan Strongswan 4.2.7
Strongswan Strongswan 4.2.8
Strongswan Strongswan 4.2.9
Strongswan Strongswan 4.1.4
5.1
CVSSv2
CVE-2013-2054
Buffer overflow in the atodn function in strongSwan 2.0.0 up to and including 4.3.4, when Opportunistic Encryption is enabled and an RSA key is being used, allows remote malicious users to cause a denial of service (pluto IKE daemon crash) and possibly execute arbitrary code via ...
Strongswan Strongswan 2.4.3
Strongswan Strongswan 2.5.7
Strongswan Strongswan 2.4.2
Strongswan Strongswan 4.1.8
Strongswan Strongswan 4.1.11
Strongswan Strongswan 2.6.16
Strongswan Strongswan 2.5.3
Strongswan Strongswan 2.8.0
Strongswan Strongswan 4.2.6
Strongswan Strongswan 2.8.1
Strongswan Strongswan 2.4.4
Strongswan Strongswan 2.6.0
Strongswan Strongswan 2.3.0
Strongswan Strongswan 4.2.12
Strongswan Strongswan 4.1.1
Strongswan Strongswan 2.7.2
Strongswan Strongswan 4.2.10
Strongswan Strongswan 2.1.0
Strongswan Strongswan 2.1.5
Strongswan Strongswan 2.0.2
Strongswan Strongswan 2.8.9
Strongswan Strongswan 2.8.8
5
CVSSv2
CVE-2009-2185
The ASN.1 parser (pluto/asn1.c, libstrongswan/asn1/asn1.c, libstrongswan/asn1/asn1_parser.c) in (a) strongSwan 2.8 prior to 2.8.10, 4.2 prior to 4.2.16, and 4.3 prior to 4.3.2; and (b) openSwan 2.6 prior to 2.6.22 and 2.4 prior to 2.4.15 allows remote malicious users to cause a d...
Strongswan Strongswan 2.8.6
Strongswan Strongswan 2.8.5
Strongswan Strongswan 4.2.6
Strongswan Strongswan 4.2.2
Strongswan Strongswan 4.2.13
Strongswan Strongswan 4.2.12
Strongswan Strongswan 2.8.9
Strongswan Strongswan 4.2.15
Xelerance Openswan 2.6.18
Xelerance Openswan 2.6.13
Xelerance Openswan 2.6.06
Xelerance Openswan 2.6.07
Xelerance Openswan 2.4.9
Xelerance Openswan 2.4.1
Strongswan Strongswan 2.8.2
Strongswan Strongswan 2.8.1
Strongswan Strongswan 4.2.5
Strongswan Strongswan 4.2.9
Strongswan Strongswan 4.2.10
Strongswan Strongswan 4.2.1
Xelerance Openswan 2.6.16
Xelerance Openswan 2.6.20
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2022-48700
CVE-2022-48689
CVE-2024-27956
CVE-2023-6363
SQL
NULL pointer dereference
CVE-2023-41830
CVE-2015-2051
arbitrary
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started