The asn1_length function in strongSwan 2.8 prior to 2.8.11, 4.2 prior to 4.2.17, and 4.3 prior to 4.3.3 does not properly handle X.509 certificates with crafted Relative Distinguished Names (RDNs), which allows remote malicious users to cause a denial of service (pluto IKE daemon crash) via malformed ASN.1 data. NOTE: this is due to an incomplete fix for CVE-2009-2185.
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
strongswan strongswan 2.8.5 |
||
strongswan strongswan 2.8.6 |
||
strongswan strongswan 4.2.12 |
||
strongswan strongswan 4.2.0 |
||
strongswan strongswan 2.8.10 |
||
strongswan strongswan 4.2.16 |
||
strongswan strongswan 2.8.3 |
||
strongswan strongswan 2.8.4 |
||
strongswan strongswan 4.2.13 |
||
strongswan strongswan 4.2.14 |
||
strongswan strongswan 4.3.1 |
||
strongswan strongswan 4.3.2 |
||
strongswan strongswan 2.8.1 |
||
strongswan strongswan 2.8.2 |
||
strongswan strongswan 4.2.3 |
||
strongswan strongswan 4.2.15 |
||
strongswan strongswan 4.2.10 |
||
strongswan strongswan 4.3.0 |
||
strongswan strongswan 2.8.0 |
||
strongswan strongswan 2.8.7 |
||
strongswan strongswan 2.8.8 |
||
strongswan strongswan 4.2.2 |
||
strongswan strongswan 4.2.11 |
||
strongswan strongswan 4.2.1 |