First published: Fri Aug 20 2010(Updated: )
The IKE daemon in strongSwan 4.3.x before 4.3.7 and 4.4.x before 4.4.1 does not properly check the return values of snprintf calls, which allows remote attackers to execute arbitrary code via crafted (1) certificate or (2) identity data that triggers buffer overflows.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Strongswan Strongswan | =4.4.0 | |
Strongswan Strongswan | =4.3.5 | |
Strongswan Strongswan | =4.3.2 | |
Strongswan Strongswan | =4.3.3 | |
Strongswan Strongswan | =4.3.0 | |
Strongswan Strongswan | =4.3.6 | |
Strongswan Strongswan | =4.3.1 | |
Strongswan Strongswan | =4.3.4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.