Search CVE reports
11 – 20 of 42 results
Some fixes available 13 of 14
In strongSwan before 5.9.5, a malicious responder can send an EAP-Success message too early without actually authenticating the client and (in the case of EAP methods with mutual authentication and EAP-only authentication for...
1 affected package
strongswan
| Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
|---|---|---|---|---|
| strongswan | Fixed | Fixed | Fixed | Fixed |
The in-memory certificate cache in strongSwan before 5.9.4 has a remote integer overflow upon receiving many requests with different certificates to fill the cache and later trigger the replacement of cache entries. The code...
1 affected package
strongswan
| Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
|---|---|---|---|---|
| strongswan | Fixed | Fixed | Fixed | Fixed |
The gmp plugin in strongSwan before 5.9.4 has a remote integer overflow via a crafted certificate with an RSASSA-PSS signature. For example, this can be triggered by an unrelated self-signed CA certificate sent by an initiator....
1 affected package
strongswan
| Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
|---|---|---|---|---|
| strongswan | Fixed | Fixed | Fixed | Fixed |
The gmp plugin in strongSwan before 5.7.1 has a Buffer Overflow via a crafted certificate.
1 affected package
strongswan
| Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
|---|---|---|---|---|
| strongswan | — | — | — | Fixed |
In verify_emsa_pkcs1_signature() in gmp_rsa_public_key.c in the gmp plugin in strongSwan 4.x and 5.x before 5.7.0, the RSA implementation based on GMP does not reject excess data in the digestAlgorithm.parameters field...
1 affected package
strongswan
| Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
|---|---|---|---|---|
| strongswan | — | — | — | Fixed |
In verify_emsa_pkcs1_signature() in gmp_rsa_public_key.c in the gmp plugin in strongSwan 4.x and 5.x before 5.7.0, the RSA implementation based on GMP does not reject excess data after the encoded algorithm OID during PKCS#1 v1.5...
1 affected package
strongswan
| Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
|---|---|---|---|---|
| strongswan | — | — | — | Fixed |
The Internet Key Exchange v1 main mode is vulnerable to offline dictionary or brute force attacks. Reusing a key pair across different versions and modes of IKE could lead to cross-protocol authentication bypasses. It is well...
4 affected packages
isakmpd, libreswan, strongswan, ipsec-tools
| Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
|---|---|---|---|---|
| isakmpd | — | Ignored | Ignored | Ignored |
| libreswan | — | Ignored | Ignored | Ignored |
| strongswan | — | Ignored | Ignored | Ignored |
| ipsec-tools | — | Not in release | Not in release | Ignored |
Some fixes available 3 of 4
In stroke_socket.c in strongSwan before 5.6.3, a missing packet length check could allow a buffer underflow, which may lead to resource exhaustion and denial of service while reading from the socket.
1 affected package
strongswan
| Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
|---|---|---|---|---|
| strongswan | — | — | — | Fixed |
Some fixes available 3 of 4
strongSwan 5.6.0 and older allows Remote Denial of Service because of Missing Initialization of a Variable.
1 affected package
strongswan
| Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
|---|---|---|---|---|
| strongswan | — | — | — | Fixed |
The rsa_pss_params_parse function in libstrongswan/credentials/keys/signature_params.c in strongSwan 5.6.1 allows remote attackers to cause a denial of service via a crafted RSASSA-PSS signature that lacks a mask generation...
1 affected package
strongswan
| Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
|---|---|---|---|---|
| strongswan | — | — | — | — |