First published: Tue May 19 2015(Updated: )
A flaw was found in the strongSwan payload handling code. This flaw can be triggered by an IKEv1 or IKEv2 message that contains payloads that are only defined for the respective other IKE version. For instance, sending an IKEv1 Main Mode message containing a payload with type 41 (IKEv2 Notify) will crash the daemon or, potentially allow for remote code execution, when a short summary of the contents of the message is logged ("parsed ID_PROT request 0 [ ... ]").
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/strongswan | <5.3.1 | 5.3.1 |
Strongswan Strongswan | =5.2.2 | |
Strongswan Strongswan | =5.3.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.