First published: Tue Aug 04 2009(Updated: )
The asn1_length function in strongSwan 2.8 before 2.8.11, 4.2 before 4.2.17, and 4.3 before 4.3.3 does not properly handle X.509 certificates with crafted Relative Distinguished Names (RDNs), which allows remote attackers to cause a denial of service (pluto IKE daemon crash) via malformed ASN.1 data. NOTE: this is due to an incomplete fix for CVE-2009-2185.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Strongswan Strongswan | =2.8.0 | |
Strongswan Strongswan | =2.8.1 | |
Strongswan Strongswan | =4.2.12 | |
Strongswan Strongswan | =4.2.10 | |
Strongswan Strongswan | =2.8.8 | |
Strongswan Strongswan | =2.8.4 | |
Strongswan Strongswan | =4.2.16 | |
Strongswan Strongswan | =4.2.14 | |
Strongswan Strongswan | =2.8.3 | |
Strongswan Strongswan | =4.2.3 | |
Strongswan Strongswan | =4.3.2 | |
Strongswan Strongswan | =4.2.0 | |
Strongswan Strongswan | =4.2.1 | |
Strongswan Strongswan | =2.8.7 | |
Strongswan Strongswan | =4.2.13 | |
Strongswan Strongswan | =4.3.0 | |
Strongswan Strongswan | =2.8.6 | |
Strongswan Strongswan | =4.2.11 | |
Strongswan Strongswan | =2.8.10 | |
Strongswan Strongswan | =4.2.2 | |
Strongswan Strongswan | =4.3.1 | |
Strongswan Strongswan | =4.2.15 | |
Strongswan Strongswan | =2.8.5 | |
Strongswan Strongswan | =2.8.2 |
http://download.strongswan.org/patches/07_asn1_length_patch/strongswan-4.x.x_asn1_length.patch
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.