7.5
CVSSv3

CVE-2017-11185

Published: 18/08/2017 Updated: 07/11/2023
CVSS v2 Base Score: 5 | Impact Score: 2.9 | Exploitability Score: 10
CVSS v3 Base Score: 7.5 | Impact Score: 3.6 | Exploitability Score: 3.9
VMScore: 445
Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P

Vulnerability Summary

The gmp plugin in strongSwan prior to 5.6.0 allows remote malicious users to cause a denial of service (NULL pointer dereference and daemon crash) via a crafted RSA signature.

Vulnerable Product Search on Vulmon Subscribe to Product

strongswan strongswan

Vendor Advisories

strongSwan could be made to crash or hang if it received specially crafted network traffic ...
Debian Bug report logs - #872155 strongswan: CVE-2017-11185: Insufficient Input Validation in gmp Plugin Package: src:strongswan; Maintainer for src:strongswan is strongSwan Maintainers <pkg-swan-devel@listsaliothdebianorg>; Reported by: Salvatore Bonaccorso <carnil@debianorg> Date: Mon, 14 Aug 2017 17:12:02 UTC ...
A denial of service vulnerability was identified in strongSwan, an IKE/IPsec suite, using Google's OSS-Fuzz fuzzing project The gmp plugin in strongSwan had insufficient input validation when verifying RSA signatures This coding error could lead to a null pointer dereference, leading to process crash For the oldstable distribution (jessie), this ...
The gmp plugin in strongSwan before 560 allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) via a crafted RSA signature ...
Fixed a DoS vulnerability in the gmp plugin that was caused by insufficient input validation when verifying RSA signatures, which requires decryption with the operation m^e mod n, where m is the signature, and e and n are the exponent and modulus of the public key The value m is an integer between 0 and n-1, however, the gmp plugin did not verify ...