First published: Mon Oct 01 2018(Updated: )
It was discovered that strongSwan incorrectly handled signature validation in the gmp plugin. A remote attacker could use this issue to cause strongSwan to crash, resulting in a denial of service, or possibly execute arbitrary code.
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
ubuntu/libstrongswan | <5.6.2-1ubuntu2.3 | 5.6.2-1ubuntu2.3 |
Ubuntu Ubuntu | =18.04 | |
All of | ||
ubuntu/strongswan | <5.6.2-1ubuntu2.3 | 5.6.2-1ubuntu2.3 |
Ubuntu Ubuntu | =18.04 | |
All of | ||
ubuntu/libstrongswan | <5.3.5-1ubuntu3.8 | 5.3.5-1ubuntu3.8 |
Ubuntu Ubuntu | =16.04 | |
All of | ||
ubuntu/strongswan | <5.3.5-1ubuntu3.8 | 5.3.5-1ubuntu3.8 |
Ubuntu Ubuntu | =16.04 | |
All of | ||
ubuntu/libstrongswan | <5.1.2-0ubuntu2.11 | 5.1.2-0ubuntu2.11 |
Ubuntu Ubuntu | =14.04 | |
All of | ||
ubuntu/strongswan | <5.1.2-0ubuntu2.11 | 5.1.2-0ubuntu2.11 |
Ubuntu Ubuntu | =14.04 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this strongSwan vulnerability is USN-3774-1.
The vulnerability involves incorrect handling of signature validation in the gmp plugin of strongSwan.
This vulnerability can cause strongSwan to crash, resulting in a denial of service, or possibly allow remote attackers to execute arbitrary code.
Versions 18.04, 16.04, and 14.04 of Ubuntu, along with their corresponding versions of libstrongswan and strongswan, are affected by this vulnerability.
The recommended remedy is to update libstrongswan and strongswan to version 5.6.2-1ubuntu2.3 for Ubuntu 18.04, 5.3.5-1ubuntu3.8 for Ubuntu 16.04, and 5.1.2-0ubuntu2.11 for Ubuntu 14.04.