Strongswan

Strongswan

37 vulnerabilities found.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.05%
  • Published 14.05.2024 11:57:00
  • Last modified 22.08.2025 15:04:16

strongSwan versions 5.9.2 through 5.9.5 are affected by authorization bypass through improper validation of certificate with host mismatch (CWE-297). When certificates are used to authenticate clients in TLS-based EAP methods, the IKE or EAP identity...

  • EPSS 11.73%
  • Published 07.12.2023 05:15:09
  • Last modified 17.01.2025 20:15:26

strongSwan before 5.9.12 has a buffer overflow and possible unauthenticated remote code execution via a DH public value that exceeds the internal buffer in charon-tkm's DH proxy. The earliest affected version is 5.3.0. An attack can occur via a craft...

  • EPSS 12.16%
  • Published 15.04.2023 00:15:07
  • Last modified 07.02.2025 22:15:12

strongSwan 5.9.8 and 5.9.9 potentially allows remote code execution because it uses a variable named "public" for two different purposes within the same function. There is initially incorrect access control, later followed by an expired pointer deref...

  • EPSS 0.21%
  • Published 31.10.2022 06:15:09
  • Last modified 06.05.2025 19:15:56

strongSwan before 5.9.8 allows remote attackers to cause a denial of service in the revocation plugin by sending a crafted end-entity (and intermediate CA) certificate that contains a CRL/OCSP URL that points to a server (under the attacker's control...

  • EPSS 0.1%
  • Published 31.01.2022 08:15:07
  • Last modified 21.11.2024 06:31:54

In strongSwan before 5.9.5, a malicious responder can send an EAP-Success message too early without actually authenticating the client and (in the case of EAP methods with mutual authentication and EAP-only authentication for IKEv2) even without serv...

  • EPSS 2.33%
  • Published 18.10.2021 14:15:10
  • Last modified 21.11.2024 06:27:02

The in-memory certificate cache in strongSwan before 5.9.4 has a remote integer overflow upon receiving many requests with different certificates to fill the cache and later trigger the replacement of cache entries. The code attempts to select a less...

  • EPSS 2%
  • Published 18.10.2021 14:15:10
  • Last modified 21.11.2024 06:27:01

The gmp plugin in strongSwan before 5.9.4 has a remote integer overflow via a crafted certificate with an RSASSA-PSS signature. For example, this can be triggered by an unrelated self-signed CA certificate sent by an initiator. Remote code execution ...

  • EPSS 0.23%
  • Published 12.06.2019 14:29:02
  • Last modified 21.11.2024 04:18:32

The Libreswan Project has found a vulnerability in the processing of IKEv1 informational exchange packets which are encrypted and integrity protected using the established IKE SA encryption and integrity keys, but as a receiver, the integrity check v...

  • EPSS 3.98%
  • Published 03.10.2018 20:29:09
  • Last modified 21.11.2024 03:54:34

The gmp plugin in strongSwan before 5.7.1 has a Buffer Overflow via a crafted certificate.

  • EPSS 1.33%
  • Published 26.09.2018 21:29:01
  • Last modified 21.11.2024 03:52:10

In verify_emsa_pkcs1_signature() in gmp_rsa_public_key.c in the gmp plugin in strongSwan 4.x and 5.x before 5.7.0, the RSA implementation based on GMP does not reject excess data in the digestAlgorithm.parameters field during PKCS#1 v1.5 signature ve...