5
CVE-2009-2661
- EPSS 1.79%
- Published 04.08.2009 16:30:00
- Last modified 09.04.2025 00:30:58
- Source cve@mitre.org
- Teams watchlist Login
- Open Login
The asn1_length function in strongSwan 2.8 before 2.8.11, 4.2 before 4.2.17, and 4.3 before 4.3.3 does not properly handle X.509 certificates with crafted Relative Distinguished Names (RDNs), which allows remote attackers to cause a denial of service (pluto IKE daemon crash) via malformed ASN.1 data. NOTE: this is due to an incomplete fix for CVE-2009-2185.
Data is provided by the National Vulnerability Database (NVD)
Strongswan ≫ Strongswan Version2.8.0
Strongswan ≫ Strongswan Version2.8.1
Strongswan ≫ Strongswan Version2.8.2
Strongswan ≫ Strongswan Version2.8.3
Strongswan ≫ Strongswan Version2.8.4
Strongswan ≫ Strongswan Version2.8.5
Strongswan ≫ Strongswan Version2.8.6
Strongswan ≫ Strongswan Version2.8.7
Strongswan ≫ Strongswan Version2.8.8
Strongswan ≫ Strongswan Version2.8.10
Strongswan ≫ Strongswan Version4.2.0
Strongswan ≫ Strongswan Version4.2.1
Strongswan ≫ Strongswan Version4.2.2
Strongswan ≫ Strongswan Version4.2.3
Strongswan ≫ Strongswan Version4.2.10
Strongswan ≫ Strongswan Version4.2.11
Strongswan ≫ Strongswan Version4.2.12
Strongswan ≫ Strongswan Version4.2.13
Strongswan ≫ Strongswan Version4.2.14
Strongswan ≫ Strongswan Version4.2.15
Strongswan ≫ Strongswan Version4.2.16
Strongswan ≫ Strongswan Version4.3.0
Strongswan ≫ Strongswan Version4.3.1
Strongswan ≫ Strongswan Version4.3.2
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
Type | Source | Score | Percentile |
---|---|---|---|
EPSS | FIRST.org | 1.79% | 0.811 |
Source | Base Score | Exploit Score | Impact Score | Vector string |
---|---|---|---|---|
nvd@nist.gov | 5 | 10 | 2.9 |
AV:N/AC:L/Au:N/C:N/I:N/A:P
|