First published: Wed Jan 07 2015(Updated: )
strongSwan 4.5.x through 5.2.x before 5.2.1 allows remote attackers to cause a denial of service (invalid pointer dereference) via a crafted IKEv2 Key Exchange (KE) message with Diffie-Hellman (DH) group 1025.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Strongswan Strongswan | =4.5.0 | |
Strongswan Strongswan | =4.5.1 | |
Strongswan Strongswan | =4.5.2 | |
Strongswan Strongswan | =4.5.3 | |
Strongswan Strongswan | =4.6.0 | |
Strongswan Strongswan | =4.6.1 | |
Strongswan Strongswan | =4.6.2 | |
Strongswan Strongswan | =4.6.3 | |
Strongswan Strongswan | =4.6.4 | |
Strongswan Strongswan | =5.0.0 | |
Strongswan Strongswan | =5.0.1 | |
Strongswan Strongswan | =5.0.2 | |
Strongswan Strongswan | =5.0.3 | |
Strongswan Strongswan | =5.0.4 | |
Strongswan Strongswan | =5.1.0 | |
Strongswan Strongswan | =5.1.1 | |
Strongswan Strongswan | =5.1.2 | |
Strongswan Strongswan | =5.1.3 | |
Strongswan Strongswan | =5.2.0 | |
openSUSE openSUSE | =13.1 | |
openSUSE openSUSE | =13.2 | |
Canonical Ubuntu Linux | =14.04 | |
Canonical Ubuntu Linux | =14.10 | |
Fedoraproject Fedora | =21 | |
Debian Debian Linux | =7.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.