First published: Mon Oct 31 2022(Updated: )
strongSwan before 5.9.8 allows remote attackers to cause a denial of service in the revocation plugin by sending a crafted end-entity (and intermediate CA) certificate that contains a CRL/OCSP URL that points to a server (under the attacker's control) that doesn't properly respond but (for example) just does nothing after the initial TCP handshake, or sends an excessive amount of application data.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Strongswan Strongswan | <5.9.8 | |
Canonical Ubuntu Linux | =14.04 | |
Canonical Ubuntu Linux | =16.04 | |
Canonical Ubuntu Linux | =18.04 | |
Canonical Ubuntu Linux | =20.04 | |
Canonical Ubuntu Linux | =22.04 | |
Debian Debian Linux | =10.0 | |
Debian Debian Linux | =11.0 | |
Fedoraproject Fedora | =37 | |
Stormshield Stormshield Network Security | >=3.11.1<3.11.20 | |
Stormshield Stormshield Network Security | >=4.3.1<4.3.15 | |
Stormshield Stormshield Network Security | >=4.5.1<4.6.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-40617 is a vulnerability in strongSwan before 5.9.8 that allows remote attackers to cause a denial of service in the revocation plugin.
CVE-2022-40617 affects strongSwan versions before 5.9.8, as well as certain versions of Ubuntu Linux, Debian Linux, Fedora, and Stormshield Network Security.
CVE-2022-40617 has a severity rating of 7.5 (high).
To fix CVE-2022-40617, upgrade to strongSwan version 5.9.8 or later.
You can find more information about CVE-2022-40617 in the following references: [link1](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/J3GAYIOCSLU57C45CO4UE4IV4JZE4W3L), [link2](https://www.strongswan.org/blog/2022/10/03/strongswan-vulnerability-(cve-2022-40617).html)