Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
strongswan strongswan vulnerabilities and exploits
(subscribe to this query)
5
CVSSv2
CVE-2018-16152
In verify_emsa_pkcs1_signature() in gmp_rsa_public_key.c in the gmp plugin in strongSwan 4.x and 5.x prior to 5.7.0, the RSA implementation based on GMP does not reject excess data in the digestAlgorithm.parameters field during PKCS#1 v1.5 signature verification. Consequently, a ...
Strongswan Strongswan
Debian Debian Linux 8.0
Debian Debian Linux 9.0
Canonical Ubuntu Linux 16.04
Canonical Ubuntu Linux 14.04
Canonical Ubuntu Linux 18.04
5
CVSSv2
CVE-2018-10811
strongSwan 5.6.0 and older allows Remote Denial of Service because of Missing Initialization of a Variable.
Strongswan Strongswan
Debian Debian Linux 8.0
Debian Debian Linux 9.0
Canonical Ubuntu Linux 18.04
Canonical Ubuntu Linux 14.04
Canonical Ubuntu Linux 16.04
Fedoraproject Fedora 28
4
CVSSv2
CVE-2018-5388
In stroke_socket.c in strongSwan prior to 5.6.3, a missing packet length check could allow a buffer underflow, which may lead to resource exhaustion and denial of service while reading from the socket.
Strongswan Strongswan
Debian Debian Linux 8.0
Debian Debian Linux 9.0
Canonical Ubuntu Linux 16.04
Canonical Ubuntu Linux 14.04
Canonical Ubuntu Linux 18.04
5
CVSSv2
CVE-2018-6459
The rsa_pss_params_parse function in libstrongswan/credentials/keys/signature_params.c in strongSwan 5.6.1 allows remote malicious users to cause a denial of service via a crafted RSASSA-PSS signature that lacks a mask generation function parameter.
Strongswan Strongswan 5.6.1
7.5
CVSSv2
CVE-2015-3991
strongSwan 5.2.2 and 5.3.0 allows remote malicious users to cause a denial of service (daemon crash) or execute arbitrary code.
Strongswan Strongswan 5.2.2
Strongswan Strongswan 5.3.0
5
CVSSv2
CVE-2017-11185
The gmp plugin in strongSwan prior to 5.6.0 allows remote malicious users to cause a denial of service (NULL pointer dereference and daemon crash) via a crafted RSA signature.
Strongswan Strongswan
5
CVSSv2
CVE-2017-9022
The gmp plugin in strongSwan prior to 5.5.3 does not properly validate RSA public keys before calling mpz_powm_sec, which allows remote peers to cause a denial of service (floating point exception and process crash) via a crafted certificate.
Strongswan Strongswan
Debian Debian Linux 8.0
Debian Debian Linux 9.0
Canonical Ubuntu Linux 16.10
Canonical Ubuntu Linux 16.04
Canonical Ubuntu Linux 14.04
Canonical Ubuntu Linux 17.04
4.3
CVSSv2
CVE-2017-9023
The ASN.1 parser in strongSwan prior to 5.5.3 improperly handles CHOICE types when the x509 plugin is enabled, which allows remote malicious users to cause a denial of service (infinite loop) via a crafted certificate.
Strongswan Strongswan
5
CVSSv2
CVE-2015-8023
The server implementation of the EAP-MSCHAPv2 protocol in the eap-mschapv2 plugin in strongSwan 4.2.12 up to and including 5.x prior to 5.3.4 does not properly validate local state, which allows remote malicious users to bypass authentication via an empty Success message in respo...
Canonical Ubuntu Linux 15.10
Canonical Ubuntu Linux 14.04
Canonical Ubuntu Linux 15.04
Strongswan Strongswan 5.2.3
Strongswan Strongswan 4.3.7
Strongswan Strongswan 4.2.12
Strongswan Strongswan 5.1.2
Strongswan Strongswan 4.2.16
Strongswan Strongswan 4.5.3
Strongswan Strongswan 4.5.2
Strongswan Strongswan 5.0.1
Strongswan Strongswan 5.3.2
Strongswan Strongswan 4.4.0
Strongswan Strongswan 5.2.2
Strongswan Strongswan 5.1.0
Strongswan Strongswan 4.5.1
Strongswan Strongswan 4.2.14
Strongswan Strongswan 4.3.5
Strongswan Strongswan 5.2.0
Strongswan Strongswan 5.1.3
Strongswan Strongswan 4.3.2
Strongswan Strongswan 4.6.4
2.6
CVSSv2
CVE-2015-4171
strongSwan 4.3.0 up to and including 5.x prior to 5.3.2 and strongSwan VPN Client prior to 1.4.6, when using EAP or pre-shared keys for authenticating an IKEv2 connection, does not enforce server authentication restrictions until the entire authentication process is complete, whi...
Strongswan Strongswan Vpn Client
Debian Debian Linux 8.0
Canonical Ubuntu Linux 15.04
Canonical Ubuntu Linux 14.10
Canonical Ubuntu Linux 14.04
Strongswan Strongswan 4.3.0
Strongswan Strongswan 4.3.7
Strongswan Strongswan 4.4.0
Strongswan Strongswan 4.6.1
Strongswan Strongswan 4.6.2
Strongswan Strongswan 5.1.0
Strongswan Strongswan 5.1.1
Strongswan Strongswan 5.3.0
Strongswan Strongswan 5.3.1
Strongswan Strongswan 4.3.3
Strongswan Strongswan 4.3.4
Strongswan Strongswan 4.5.1
Strongswan Strongswan 4.5.2
Strongswan Strongswan 5.0.0
Strongswan Strongswan 5.0.1
Strongswan Strongswan 5.2.0
Strongswan Strongswan 5.2.1
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-4671
unauthorized
CVE-2024-4776
CVE-2024-3407
CVE-2024-26026
CVE-2024-32888
wireless
CVE-2024-4656
template injection
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
NEXT »