Product:

Strongswan

(Strongswan)
Repositories

Unknown:

This might be proprietary software.

#Vulnerabilities 36
Date Id Summary Products Score Patch Annotated
2018-05-31 CVE-2018-5388 In stroke_socket.c in strongSwan before 5.6.3, a missing packet length check could allow a buffer underflow, which may lead to resource exhaustion and denial of service while reading from the socket. Ubuntu_linux, Debian_linux, Strongswan 6.5
2018-02-20 CVE-2018-6459 The rsa_pss_params_parse function in libstrongswan/credentials/keys/signature_params.c in strongSwan 5.6.1 allows remote attackers to cause a denial of service via a crafted RSASSA-PSS signature that lacks a mask generation function parameter. Strongswan 5.3
2018-06-19 CVE-2018-10811 strongSwan 5.6.0 and older allows Remote Denial of Service because of Missing Initialization of a Variable. Ubuntu_linux, Debian_linux, Fedora, Strongswan 7.5
2018-09-26 CVE-2018-16151 In verify_emsa_pkcs1_signature() in gmp_rsa_public_key.c in the gmp plugin in strongSwan 4.x and 5.x before 5.7.0, the RSA implementation based on GMP does not reject excess data after the encoded algorithm OID during PKCS#1 v1.5 signature verification. Similar to the flaw in the same version of strongSwan regarding digestAlgorithm.parameters, a remote attacker can forge signatures when small public exponents are being used, which could lead to impersonation when only an RSA signature is... Ubuntu_linux, Debian_linux, Strongswan 7.5
2018-09-26 CVE-2018-16152 In verify_emsa_pkcs1_signature() in gmp_rsa_public_key.c in the gmp plugin in strongSwan 4.x and 5.x before 5.7.0, the RSA implementation based on GMP does not reject excess data in the digestAlgorithm.parameters field during PKCS#1 v1.5 signature verification. Consequently, a remote attacker can forge signatures when small public exponents are being used, which could lead to impersonation when only an RSA signature is used for IKEv2 authentication. This is a variant of CVE-2006-4790 and... Ubuntu_linux, Debian_linux, Strongswan 7.5
2018-10-03 CVE-2018-17540 The gmp plugin in strongSwan before 5.7.1 has a Buffer Overflow via a crafted certificate. Ubuntu_linux, Debian_linux, Strongswan 7.5
2019-06-12 CVE-2019-10155 The Libreswan Project has found a vulnerability in the processing of IKEv1 informational exchange packets which are encrypted and integrity protected using the established IKE SA encryption and integrity keys, but as a receiver, the integrity check value was not verified. This issue affects versions before 3.29. Fedora, Libreswan, Enterprise_linux, Strongswan, Openswan 3.1
2021-10-18 CVE-2021-41990 The gmp plugin in strongSwan before 5.9.4 has a remote integer overflow via a crafted certificate with an RSASSA-PSS signature. For example, this can be triggered by an unrelated self-signed CA certificate sent by an initiator. Remote code execution cannot occur. Debian_linux, Fedora, 6gk5615\-0aa00\-2aa2_firmware, 6gk5804\-0ap00\-2aa2_firmware, 6gk5812\-1aa00\-2aa2_firmware, 6gk5812\-1ba00\-2aa2_firmware, 6gk5816\-1aa00\-2aa2_firmware, 6gk5816\-1ba00\-2aa2_firmware, 6gk5826\-2ab00\-2ab2_firmware, 6gk5856\-2ea00\-3aa1_firmware, 6gk5856\-2ea00\-3da1_firmware, 6gk5874\-2aa00\-2aa2_firmware, 6gk5874\-3aa00\-2aa2_firmware, 6gk5876\-3aa02\-2ba2_firmware, 6gk5876\-3aa02\-2ea2_firmware, 6gk5876\-4aa00\-2ba2_firmware, 6gk5876\-4aa00\-2da2_firmware, 6gk6108\-4am00\-2ba2_firmware, 6gk6108\-4am00\-2da2_firmware, Strongswan 7.5
2021-10-18 CVE-2021-41991 The in-memory certificate cache in strongSwan before 5.9.4 has a remote integer overflow upon receiving many requests with different certificates to fill the cache and later trigger the replacement of cache entries. The code attempts to select a less-often-used cache entry by means of a random number generator, but this is not done correctly. Remote code execution might be a slight possibility. Debian_linux, Fedora, Cp_1543\-1_firmware, Scalance_sc622\-2c_firmware, Scalance_sc632\-2c_firmware, Scalance_sc636\-2c_firmware, Scalance_sc642\-2c_firmware, Scalance_sc646\-2c_firmware, Simatic_cp_1242\-7_gprs_v2_firmware, Simatic_cp_1243\-1_firmware, Simatic_cp_1243\-7_lte\/us_firmware, Simatic_cp_1542sp\-1_firmware, Simatic_cp_1542sp\-1_irc_firmware, Simatic_cp_1543sp\-1_firmware, Simatic_net_cp1243\-7_lte_eu_firmware, Simatic_net_cp_1243\-8_irc_firmware, Simatic_net_cp_1545\-1_firmware, Sinema_remote_connect_server, Siplus_et_200sp_cp_1542sp\-1_irc_tx_rail_firmware, Siplus_et_200sp_cp_1543sp\-1_isec_firmware, Siplus_et_200sp_cp_1543sp\-1_isec_tx_rail_firmware, Siplus_net_cp_1543\-1_firmware, Siplus_s7\-1200_cp_1243\-1_firmware, Siplus_s7\-1200_cp_1243\-1_rail_firmware, Strongswan 7.5
2022-01-31 CVE-2021-45079 In strongSwan before 5.9.5, a malicious responder can send an EAP-Success message too early without actually authenticating the client and (in the case of EAP methods with mutual authentication and EAP-only authentication for IKEv2) even without server authentication. Ubuntu_linux, Debian_linux, Extra_packages_for_enterprise_linux, Fedora, Strongswan 9.1