6.5
CVSSv3

CVE-2018-5388

Published: 31/05/2018 Updated: 07/11/2023
CVSS v2 Base Score: 4 | Impact Score: 2.9 | Exploitability Score: 8
CVSS v3 Base Score: 6.5 | Impact Score: 3.6 | Exploitability Score: 2.8
VMScore: 356
Vector: AV:N/AC:L/Au:S/C:N/I:N/A:P

Vulnerability Summary

In stroke_socket.c in strongSwan prior to 5.6.3, a missing packet length check could allow a buffer underflow, which may lead to resource exhaustion and denial of service while reading from the socket.

Vulnerable Product Search on Vulmon Subscribe to Product

strongswan strongswan

debian debian linux 8.0

debian debian linux 9.0

canonical ubuntu linux 16.04

canonical ubuntu linux 14.04

canonical ubuntu linux 18.04

Vendor Advisories

Several security issues were fixed in strongSwan ...
Two vulnerabilities were discovered in strongSwan, an IKE/IPsec suite CVE-2018-5388 The stroke plugin did not verify the message length when reading from its control socket This vulnerability could lead to denial of service On Debian write access to the socket requires root permission on default configuration CVE-2018-10811 ...
An integer underflow has been discovered in strongSwan VPN's charon server, which could lead to a buffer overflow and consequent crash A local attacker, with enough privileges to access the Unix Domain Socket /var/run/charonctl, could use this vulnerability to crash the charon server ...
strongSwan VPN's charon server prior to version 563 is missing a packet length check in stroke_socketc, allowing a buffer overflow which may lead to resource exhaustion and denial of service while reading from the socket According to the vendor, an attacker must typically have local root permissions to access the socket However, other accounts ...