7.5
CVSSv3

CVE-2017-11185

Published: 18/08/2017 Updated: 07/11/2023
CVSS v2 Base Score: 5 | Impact Score: 2.9 | Exploitability Score: 10
CVSS v3 Base Score: 7.5 | Impact Score: 3.6 | Exploitability Score: 3.9
VMScore: 445
Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P

Vulnerability Summary

The gmp plugin in strongSwan prior to 5.6.0 allows remote malicious users to cause a denial of service (NULL pointer dereference and daemon crash) via a crafted RSA signature.

Vulnerable Product Search on Vulmon Subscribe to Product

strongswan strongswan

Vendor Advisories

Debian Bug report logs - #872155 strongswan: CVE-2017-11185: Insufficient Input Validation in gmp Plugin Package: src:strongswan; Maintainer for src:strongswan is strongSwan Maintainers <pkg-swan-devel@listsaliothdebianorg>; Reported by: Salvatore Bonaccorso <carnil@debianorg> Date: Mon, 14 Aug 2017 17:12:02 UTC ...
strongSwan could be made to crash or hang if it received specially crafted network traffic ...
A denial of service vulnerability was identified in strongSwan, an IKE/IPsec suite, using Google's OSS-Fuzz fuzzing project The gmp plugin in strongSwan had insufficient input validation when verifying RSA signatures This coding error could lead to a null pointer dereference, leading to process crash For the oldstable distribution (jessie), this ...
The gmp plugin in strongSwan before 560 allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) via a crafted RSA signature ...
Fixed a DoS vulnerability in the gmp plugin that was caused by insufficient input validation when verifying RSA signatures, which requires decryption with the operation m^e mod n, where m is the signature, and e and n are the exponent and modulus of the public key The value m is an integer between 0 and n-1, however, the gmp plugin did not verify ...