Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
strongswan strongswan 4.3.2 vulnerabilities and exploits
(subscribe to this query)
NA
CVE-2010-2628
The IKE daemon in strongSwan 4.3.x prior to 4.3.7 and 4.4.x prior to 4.4.1 does not properly check the return values of snprintf calls, which allows remote malicious users to execute arbitrary code via crafted (1) certificate or (2) identity data that triggers buffer overflows.
Strongswan Strongswan 4.3.3
Strongswan Strongswan 4.3.4
Strongswan Strongswan 4.3.5
Strongswan Strongswan 4.3.0
Strongswan Strongswan 4.3.1
Strongswan Strongswan 4.3.2
Strongswan Strongswan 4.3.6
Strongswan Strongswan 4.4.0
NA
CVE-2009-2661
The asn1_length function in strongSwan 2.8 prior to 2.8.11, 4.2 prior to 4.2.17, and 4.3 prior to 4.3.3 does not properly handle X.509 certificates with crafted Relative Distinguished Names (RDNs), which allows remote malicious users to cause a denial of service (pluto IKE daemon...
Strongswan Strongswan 2.8.5
Strongswan Strongswan 2.8.6
Strongswan Strongswan 4.2.12
Strongswan Strongswan 4.2.0
Strongswan Strongswan 2.8.10
Strongswan Strongswan 4.2.16
Strongswan Strongswan 2.8.3
Strongswan Strongswan 2.8.4
Strongswan Strongswan 4.2.13
Strongswan Strongswan 4.2.14
Strongswan Strongswan 4.3.1
Strongswan Strongswan 4.3.2
Strongswan Strongswan 2.8.1
Strongswan Strongswan 2.8.2
Strongswan Strongswan 4.2.3
Strongswan Strongswan 4.2.15
Strongswan Strongswan 4.2.10
Strongswan Strongswan 4.3.0
Strongswan Strongswan 2.8.0
Strongswan Strongswan 2.8.7
Strongswan Strongswan 2.8.8
Strongswan Strongswan 4.2.2
NA
CVE-2012-2388
The GMP Plugin in strongSwan 4.2.0 up to and including 4.6.3 allows remote malicious users to bypass authentication via a (1) empty or (2) zeroed RSA signature, aka "RSA signature verification vulnerability."
Strongswan Strongswan 4.2.16
Strongswan Strongswan 4.2.9
Strongswan Strongswan 4.2.6
Strongswan Strongswan 4.2.15
Strongswan Strongswan 4.2.1
Strongswan Strongswan 4.3.2
Strongswan Strongswan 4.6.0
Strongswan Strongswan 4.6.1
Strongswan Strongswan 4.4.1
Strongswan Strongswan 4.2.11
Strongswan Strongswan 4.2.10
Strongswan Strongswan 4.2.5
Strongswan Strongswan 4.2.0
Strongswan Strongswan 4.3.5
Strongswan Strongswan 4.4.0
Strongswan Strongswan 4.5.1
Strongswan Strongswan 4.5.0
Strongswan Strongswan 4.2.13
Strongswan Strongswan 4.2.12
Strongswan Strongswan 4.2.3
Strongswan Strongswan 4.2.4
Strongswan Strongswan 4.3.4
NA
CVE-2015-8023
The server implementation of the EAP-MSCHAPv2 protocol in the eap-mschapv2 plugin in strongSwan 4.2.12 up to and including 5.x prior to 5.3.4 does not properly validate local state, which allows remote malicious users to bypass authentication via an empty Success message in respo...
Canonical Ubuntu Linux 15.10
Canonical Ubuntu Linux 14.04
Canonical Ubuntu Linux 15.04
Strongswan Strongswan 5.2.3
Strongswan Strongswan 4.3.7
Strongswan Strongswan 4.2.12
Strongswan Strongswan 5.1.2
Strongswan Strongswan 4.2.16
Strongswan Strongswan 4.5.3
Strongswan Strongswan 4.5.2
Strongswan Strongswan 5.0.1
Strongswan Strongswan 5.3.2
Strongswan Strongswan 4.4.0
Strongswan Strongswan 5.2.2
Strongswan Strongswan 5.1.0
Strongswan Strongswan 4.5.1
Strongswan Strongswan 4.2.14
Strongswan Strongswan 4.3.5
Strongswan Strongswan 5.2.0
Strongswan Strongswan 5.1.3
Strongswan Strongswan 4.3.2
Strongswan Strongswan 4.6.4
NA
CVE-2015-4171
strongSwan 4.3.0 up to and including 5.x prior to 5.3.2 and strongSwan VPN Client prior to 1.4.6, when using EAP or pre-shared keys for authenticating an IKEv2 connection, does not enforce server authentication restrictions until the entire authentication process is complete, whi...
Strongswan Strongswan Vpn Client
Debian Debian Linux 8.0
Canonical Ubuntu Linux 15.04
Canonical Ubuntu Linux 14.10
Canonical Ubuntu Linux 14.04
Strongswan Strongswan 4.3.0
Strongswan Strongswan 4.3.7
Strongswan Strongswan 4.4.0
Strongswan Strongswan 4.6.1
Strongswan Strongswan 4.6.2
Strongswan Strongswan 5.1.0
Strongswan Strongswan 5.1.1
Strongswan Strongswan 5.3.0
Strongswan Strongswan 5.3.1
Strongswan Strongswan 4.3.3
Strongswan Strongswan 4.3.4
Strongswan Strongswan 4.5.1
Strongswan Strongswan 4.5.2
Strongswan Strongswan 5.0.0
Strongswan Strongswan 5.0.1
Strongswan Strongswan 5.2.0
Strongswan Strongswan 5.2.1
NA
CVE-2014-2338
IKEv2 in strongSwan 4.0.7 prior to 5.1.3 allows remote malicious users to bypass authentication by rekeying an IKE_SA during (1) initiation or (2) re-authentication, which triggers the IKE_SA state to be set to established.
Strongswan Strongswan 5.1.2
Strongswan Strongswan 5.1.1
Strongswan Strongswan 4.6.0
Strongswan Strongswan 4.6.1
Strongswan Strongswan 4.5.3
Strongswan Strongswan 4.4.0
Strongswan Strongswan 5.0.1
Strongswan Strongswan 5.0.2
Strongswan Strongswan 4.6.4
Strongswan Strongswan 4.5.0
Strongswan Strongswan 4.3.2
Strongswan Strongswan 4.3.3
Strongswan Strongswan 4.2.10
Strongswan Strongswan 4.2.11
Strongswan Strongswan 4.3.6
Strongswan Strongswan 4.3.7
Strongswan Strongswan 4.2.14
Strongswan Strongswan 4.2.15
Strongswan Strongswan 4.2.7
Strongswan Strongswan 4.2.8
Strongswan Strongswan 4.2.9
Strongswan Strongswan 4.1.4
NA
CVE-2009-1957
charon/sa/ike_sa.c in the charon daemon in strongSWAN prior to 4.3.1 allows remote malicious users to cause a denial of service (NULL pointer dereference and crash) via an invalid IKE_SA_INIT request that triggers "an incomplete state," followed by a CREATE_CHILD_SA req...
Strongswan Strongswan 2.1.3
Strongswan Strongswan 2.1.4
Strongswan Strongswan 2.4.0
Strongswan Strongswan 2.4.0a
Strongswan Strongswan 2.5.2
Strongswan Strongswan 2.5.3
Strongswan Strongswan 2.6.16
Strongswan Strongswan 2.6.2
Strongswan Strongswan 2.8.3
Strongswan Strongswan 2.8.4
Strongswan Strongswan 4.0.2
Strongswan Strongswan 4.0.3
Strongswan Strongswan 4.1.10
Strongswan Strongswan 4.1.11
Strongswan Strongswan 4.1.2
Strongswan Strongswan 4.1.9
Strongswan Strongswan 4.2.0
Strongswan Strongswan 2.0.0
Strongswan Strongswan 2.0.1
Strongswan Strongswan 2.1.5
Strongswan Strongswan 2.2.0
Strongswan Strongswan 2.4.1
NA
CVE-2013-2054
Buffer overflow in the atodn function in strongSwan 2.0.0 up to and including 4.3.4, when Opportunistic Encryption is enabled and an RSA key is being used, allows remote malicious users to cause a denial of service (pluto IKE daemon crash) and possibly execute arbitrary code via ...
Strongswan Strongswan 2.4.3
Strongswan Strongswan 2.5.7
Strongswan Strongswan 2.4.2
Strongswan Strongswan 4.1.8
Strongswan Strongswan 4.1.11
Strongswan Strongswan 2.6.16
Strongswan Strongswan 2.5.3
Strongswan Strongswan 2.8.0
Strongswan Strongswan 4.2.6
Strongswan Strongswan 2.8.1
Strongswan Strongswan 2.4.4
Strongswan Strongswan 2.6.0
Strongswan Strongswan 2.3.0
Strongswan Strongswan 4.2.12
Strongswan Strongswan 4.1.1
Strongswan Strongswan 2.7.2
Strongswan Strongswan 4.2.10
Strongswan Strongswan 2.1.0
Strongswan Strongswan 2.1.5
Strongswan Strongswan 2.0.2
Strongswan Strongswan 2.8.9
Strongswan Strongswan 2.8.8
NA
CVE-2009-1958
charon/sa/tasks/child_create.c in the charon daemon in strongSWAN prior to 4.3.1 switches the NULL checks for TSi and TSr payloads, which allows remote malicious users to cause a denial of service via an IKE_AUTH request without a (1) TSi or (2) TSr traffic selector.
Strongswan Strongswan 4.0.3
Strongswan Strongswan 4.1.10
Strongswan Strongswan 4.1.6
Strongswan Strongswan 4.1.7
Strongswan Strongswan 4.2.4
Strongswan Strongswan 4.2.5
Strongswan Strongswan
Strongswan Strongswan 2.4.0a
Strongswan Strongswan 2.1.4
Strongswan Strongswan 2.1.3
Strongswan Strongswan 2.3.1
Strongswan Strongswan 2.4.2
Strongswan Strongswan 2.4.3
Strongswan Strongswan 2.5.2
Strongswan Strongswan 4.1.0
Strongswan Strongswan 4.1.2
Strongswan Strongswan 4.1.5
Strongswan Strongswan 4.1.4
Strongswan Strongswan 4.2.10
Strongswan Strongswan 4.2.2
Strongswan Strongswan 4.2.3
Strongswan Strongswan 4.2.12
NA
CVE-2009-2185
The ASN.1 parser (pluto/asn1.c, libstrongswan/asn1/asn1.c, libstrongswan/asn1/asn1_parser.c) in (a) strongSwan 2.8 prior to 2.8.10, 4.2 prior to 4.2.16, and 4.3 prior to 4.3.2; and (b) openSwan 2.6 prior to 2.6.22 and 2.4 prior to 2.4.15 allows remote malicious users to cause a d...
Strongswan Strongswan 2.8.6
Strongswan Strongswan 2.8.5
Strongswan Strongswan 4.2.6
Strongswan Strongswan 4.2.2
Strongswan Strongswan 4.2.13
Strongswan Strongswan 4.2.12
Strongswan Strongswan 2.8.9
Strongswan Strongswan 4.2.15
Xelerance Openswan 2.6.18
Xelerance Openswan 2.6.13
Xelerance Openswan 2.6.06
Xelerance Openswan 2.6.07
Xelerance Openswan 2.4.9
Xelerance Openswan 2.4.1
Strongswan Strongswan 2.8.2
Strongswan Strongswan 2.8.1
Strongswan Strongswan 4.2.5
Strongswan Strongswan 4.2.9
Strongswan Strongswan 4.2.10
Strongswan Strongswan 4.2.1
Xelerance Openswan 2.6.16
Xelerance Openswan 2.6.20
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
path traversal
CVE-2024-26978
CVE-2024-26982
wireless
CVE-2023-6949
CVE-2024-26980
CVE-2024-32766
CVE-2024-26939
cache poisoning
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started