First published: Mon Nov 20 2023(Updated: )
strongSwan before 5.9.12 has a buffer overflow and possible unauthenticated remote code execution via a DH public value that exceeds the internal buffer in charon-tkm's DH proxy. The earliest affected version is 5.3.0. An attack can occur via a crafted IKE_SA_INIT message.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Strongswan Strongswan | >=5.3.0<5.9.12 | |
ubuntu/strongswan | <5.6.2-1ubuntu2.9+ | 5.6.2-1ubuntu2.9+ |
ubuntu/strongswan | <5.8.2-1ubuntu3.6 | 5.8.2-1ubuntu3.6 |
ubuntu/strongswan | <5.9.5-2ubuntu2.2 | 5.9.5-2ubuntu2.2 |
ubuntu/strongswan | <5.9.8-3ubuntu4.1 | 5.9.8-3ubuntu4.1 |
ubuntu/strongswan | <5.9.11-1ubuntu1.1 | 5.9.11-1ubuntu1.1 |
ubuntu/strongswan | <5.9.12 | 5.9.12 |
ubuntu/strongswan | <5.3.5-1ubuntu3.8+ | 5.3.5-1ubuntu3.8+ |
debian/strongswan | <=5.7.2-1+deb10u2 | 5.7.2-1+deb10u4 5.9.1-1+deb11u4 5.9.8-5+deb12u1 5.9.13-2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.