First published: Tue Aug 04 2009(Updated: )
The asn1_length function in strongSwan 2.8 before 2.8.11, 4.2 before 4.2.17, and 4.3 before 4.3.3 does not properly handle X.509 certificates with crafted Relative Distinguished Names (RDNs), which allows remote attackers to cause a denial of service (pluto IKE daemon crash) via malformed ASN.1 data. NOTE: this is due to an incomplete fix for CVE-2009-2185.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
strongSwan | =2.8.0 | |
strongSwan | =2.8.1 | |
strongSwan | =4.2.12 | |
strongSwan | =4.2.10 | |
strongSwan | =2.8.8 | |
strongSwan | =2.8.4 | |
strongSwan | =4.2.16 | |
strongSwan | =4.2.14 | |
strongSwan | =2.8.3 | |
strongSwan | =4.2.3 | |
strongSwan | =4.3.2 | |
strongSwan | =4.2.0 | |
strongSwan | =4.2.1 | |
strongSwan | =2.8.7 | |
strongSwan | =4.2.13 | |
strongSwan | =4.3.0 | |
strongSwan | =2.8.6 | |
strongSwan | =4.2.11 | |
strongSwan | =2.8.10 | |
strongSwan | =4.2.2 | |
strongSwan | =4.3.1 | |
strongSwan | =4.2.15 | |
strongSwan | =2.8.5 | |
strongSwan | =2.8.2 |
http://download.strongswan.org/patches/07_asn1_length_patch/strongswan-4.x.x_asn1_length.patch
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2009-2661 is classified as a denial of service vulnerability affecting specific versions of strongSwan.
To address CVE-2009-2661, you should upgrade to strongSwan version 2.8.11, 4.2.17, or 4.3.3 or later.
CVE-2009-2661 affects strongSwan versions 2.8.0 to 2.8.10 and 4.2.0 to 4.2.16.
CVE-2009-2661 allows attackers to crash the pluto IKE daemon, resulting in a denial of service.
Yes, CVE-2009-2661 can be exploited remotely by sending crafted ASN.1 data to the affected strongSwan versions.