First published: Thu May 31 2018(Updated: )
In stroke_socket.c in strongSwan before 5.6.3, a missing packet length check could allow a buffer underflow, which may lead to resource exhaustion and denial of service while reading from the socket.
Credit: cret@cert.org cret@cert.org
Affected Software | Affected Version | How to fix |
---|---|---|
Strongswan Strongswan | <5.6.3 | |
Debian Debian Linux | =8.0 | |
Debian Debian Linux | =9.0 | |
Canonical Ubuntu Linux | =14.04 | |
Canonical Ubuntu Linux | =16.04 | |
Canonical Ubuntu Linux | =18.04 | |
debian/strongswan | 5.9.1-1+deb11u4 5.9.8-5+deb12u1 5.9.13-2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2018-5388.
The severity of CVE-2018-5388 is medium (6.5).
CVE-2018-5388 in strongSwan before 5.6.3 could lead to resource exhaustion and denial of service.
strongSwan versions 5.6.2-1ubuntu2.2, 5.1.2-0ubuntu2.10, 5.6.3, 5.3.5-1ubuntu3.7, 5.7.2-1+deb10u2, 5.7.2-1+deb10u3, 5.9.1-1+deb11u3, 5.9.8-5, 5.9.11-1 are affected.
To fix CVE-2018-5388, you should update strongSwan to version 5.6.3 or apply the provided remedies for your specific version.