5
CVSSv2

CVE-2009-2185

Published: 25/06/2009 Updated: 29/07/2019
CVSS v2 Base Score: 5 | Impact Score: 2.9 | Exploitability Score: 10
VMScore: 445
Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P

Vulnerability Summary

The ASN.1 parser (pluto/asn1.c, libstrongswan/asn1/asn1.c, libstrongswan/asn1/asn1_parser.c) in (a) strongSwan 2.8 prior to 2.8.10, 4.2 prior to 4.2.16, and 4.3 prior to 4.3.2; and (b) openSwan 2.6 prior to 2.6.22 and 2.4 prior to 2.4.15 allows remote malicious users to cause a denial of service (pluto IKE daemon crash) via an X.509 certificate with (1) crafted Relative Distinguished Names (RDNs), (2) a crafted UTCTIME string, or (3) a crafted GENERALIZEDTIME string.

Vulnerable Product Search on Vulmon Subscribe to Product

strongswan strongswan 2.8.6

strongswan strongswan 2.8.5

strongswan strongswan 4.2.6

strongswan strongswan 4.2.2

strongswan strongswan 4.2.13

strongswan strongswan 4.2.12

strongswan strongswan 2.8.9

strongswan strongswan 4.2.15

xelerance openswan 2.6.18

xelerance openswan 2.6.13

xelerance openswan 2.6.06

xelerance openswan 2.6.07

xelerance openswan 2.4.9

xelerance openswan 2.4.1

strongswan strongswan 2.8.2

strongswan strongswan 2.8.1

strongswan strongswan 4.2.5

strongswan strongswan 4.2.9

strongswan strongswan 4.2.10

strongswan strongswan 4.2.1

xelerance openswan 2.6.16

xelerance openswan 2.6.20

xelerance openswan 2.6.15

xelerance openswan 2.6.11

xelerance openswan 2.6.03

xelerance openswan 2.6.10

xelerance openswan 2.4.0

strongswan strongswan 2.8.10

strongswan strongswan 2.8.0

strongswan strongswan 2.8.8

strongswan strongswan 2.8.7

strongswan strongswan 4.2.8

strongswan strongswan 4.2.7

strongswan strongswan 4.3.0

strongswan strongswan 4.3.1

xelerance openswan 2.6.19

xelerance openswan 2.6.14

xelerance openswan 2.6.04

xelerance openswan 2.6.05

xelerance openswan 2.4.5

xelerance openswan 2.4.3

strongswan strongswan 2.8.4

strongswan strongswan 2.8.3

strongswan strongswan 4.2.3

strongswan strongswan 4.2.4

strongswan strongswan 4.2.11

strongswan strongswan 4.2.0

strongswan strongswan 4.2.14

strongswan strongswan 4.1

xelerance openswan 2.6.17

xelerance openswan 2.6.12

xelerance openswan 2.6.08

xelerance openswan 2.6.09

xelerance openswan 2.4.2

xelerance openswan 2.4.10

xelerance openswan 2.4.4

Vendor Advisories

Synopsis Important: openswan security update Type/Severity Security Advisory: Important Topic Updated openswan packages that fix multiple security issues are nowavailable for Red Hat Enterprise Linux 5This update has been rated as having important security impact by the RedHat Security Response Team ...
Debian Bug report logs - #540144 CVE-2009-2661: incomplete fix for CVE-2009-2185 Package: strongswan; Maintainer for strongswan is strongSwan Maintainers <pkg-swan-devel@listsaliothdebianorg>; Source for strongswan is src:strongswan (PTS, buildd, popcon) Reported by: Giuseppe Iuculano <giuseppe@iuculanoit> Date: ...
Several remote vulnerabilities have been discovered in strongswan, an implementation of the IPSEC and IKE protocols The Common Vulnerabilities and Exposures project identifies the following problems: CVE-2009-1957 CVE-2009-1958 The charon daemon can crash when processing certain crafted IKEv2 packets (The old stable distribution (etch) was not a ...
It was discovered that the pluto daemon in openswan, an implementation of IPSEC and IKE, could crash when processing a crafted X509 certificate For the old stable distribution (etch), this problem has been fixed in version 246+dfsg2-11+etch2 For the stable distribution (lenny), this problem has been fixed in version 2412+dfsg-13+lenny2 F ...