CVE-2018-16151
- EPSS 1.33%
- Veröffentlicht 26.09.2018 21:29:01
- Zuletzt bearbeitet 21.11.2024 03:52:10
In verify_emsa_pkcs1_signature() in gmp_rsa_public_key.c in the gmp plugin in strongSwan 4.x and 5.x before 5.7.0, the RSA implementation based on GMP does not reject excess data after the encoded algorithm OID during PKCS#1 v1.5 signature verificati...
CVE-2018-10811
- EPSS 16.95%
- Veröffentlicht 19.06.2018 21:29:00
- Zuletzt bearbeitet 21.11.2024 03:42:04
strongSwan 5.6.0 and older allows Remote Denial of Service because of Missing Initialization of a Variable.
CVE-2018-5388
- EPSS 5.53%
- Veröffentlicht 31.05.2018 13:29:00
- Zuletzt bearbeitet 21.11.2024 04:08:43
In stroke_socket.c in strongSwan before 5.6.3, a missing packet length check could allow a buffer underflow, which may lead to resource exhaustion and denial of service while reading from the socket.
CVE-2018-6459
- EPSS 0.23%
- Veröffentlicht 20.02.2018 15:29:00
- Zuletzt bearbeitet 21.11.2024 04:10:42
The rsa_pss_params_parse function in libstrongswan/credentials/keys/signature_params.c in strongSwan 5.6.1 allows remote attackers to cause a denial of service via a crafted RSASSA-PSS signature that lacks a mask generation function parameter.
CVE-2015-3991
- EPSS 4.76%
- Veröffentlicht 07.09.2017 20:29:00
- Zuletzt bearbeitet 20.04.2025 01:37:25
strongSwan 5.2.2 and 5.3.0 allows remote attackers to cause a denial of service (daemon crash) or execute arbitrary code.
CVE-2017-11185
- EPSS 0.71%
- Veröffentlicht 18.08.2017 17:29:01
- Zuletzt bearbeitet 20.04.2025 01:37:25
The gmp plugin in strongSwan before 5.6.0 allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) via a crafted RSA signature.
CVE-2017-9023
- EPSS 2.1%
- Veröffentlicht 08.06.2017 16:29:00
- Zuletzt bearbeitet 20.04.2025 01:37:25
The ASN.1 parser in strongSwan before 5.5.3 improperly handles CHOICE types when the x509 plugin is enabled, which allows remote attackers to cause a denial of service (infinite loop) via a crafted certificate.
CVE-2017-9022
- EPSS 1.03%
- Veröffentlicht 08.06.2017 16:29:00
- Zuletzt bearbeitet 20.04.2025 01:37:25
The gmp plugin in strongSwan before 5.5.3 does not properly validate RSA public keys before calling mpz_powm_sec, which allows remote peers to cause a denial of service (floating point exception and process crash) via a crafted certificate.
- EPSS 0.8%
- Veröffentlicht 18.11.2015 16:59:07
- Zuletzt bearbeitet 12.04.2025 10:46:40
The server implementation of the EAP-MSCHAPv2 protocol in the eap-mschapv2 plugin in strongSwan 4.2.12 through 5.x before 5.3.4 does not properly validate local state, which allows remote attackers to bypass authentication via an empty Success messag...
CVE-2015-4171
- EPSS 1.01%
- Veröffentlicht 10.06.2015 18:59:09
- Zuletzt bearbeitet 12.04.2025 10:46:40
strongSwan 4.3.0 through 5.x before 5.3.2 and strongSwan VPN Client before 1.4.6, when using EAP or pre-shared keys for authenticating an IKEv2 connection, does not enforce server authentication restrictions until the entire authentication process is...