5
CVE-2009-2661
- EPSS 1.79%
- Veröffentlicht 04.08.2009 16:30:00
- Zuletzt bearbeitet 09.04.2025 00:30:58
- Quelle cve@mitre.org
- CVE-Watchlists
- Unerledigt
The asn1_length function in strongSwan 2.8 before 2.8.11, 4.2 before 4.2.17, and 4.3 before 4.3.3 does not properly handle X.509 certificates with crafted Relative Distinguished Names (RDNs), which allows remote attackers to cause a denial of service (pluto IKE daemon crash) via malformed ASN.1 data. NOTE: this is due to an incomplete fix for CVE-2009-2185.
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
Strongswan ≫ Strongswan Version2.8.0
Strongswan ≫ Strongswan Version2.8.1
Strongswan ≫ Strongswan Version2.8.2
Strongswan ≫ Strongswan Version2.8.3
Strongswan ≫ Strongswan Version2.8.4
Strongswan ≫ Strongswan Version2.8.5
Strongswan ≫ Strongswan Version2.8.6
Strongswan ≫ Strongswan Version2.8.7
Strongswan ≫ Strongswan Version2.8.8
Strongswan ≫ Strongswan Version2.8.10
Strongswan ≫ Strongswan Version4.2.0
Strongswan ≫ Strongswan Version4.2.1
Strongswan ≫ Strongswan Version4.2.2
Strongswan ≫ Strongswan Version4.2.3
Strongswan ≫ Strongswan Version4.2.10
Strongswan ≫ Strongswan Version4.2.11
Strongswan ≫ Strongswan Version4.2.12
Strongswan ≫ Strongswan Version4.2.13
Strongswan ≫ Strongswan Version4.2.14
Strongswan ≫ Strongswan Version4.2.15
Strongswan ≫ Strongswan Version4.2.16
Strongswan ≫ Strongswan Version4.3.0
Strongswan ≫ Strongswan Version4.3.1
Strongswan ≫ Strongswan Version4.3.2
| Typ | Quelle | Score | Percentile |
|---|---|---|---|
| EPSS | FIRST.org | 1.79% | 0.811 |
| Quelle | Base Score | Exploit Score | Impact Score | Vector String |
|---|---|---|---|---|
| nvd@nist.gov | 5 | 10 | 2.9 |
AV:N/AC:L/Au:N/C:N/I:N/A:P
|