![](/assets/img/cve_300x82_sin_bg.png)
CVE-2018-6459 – Gentoo Linux Security Advisory 201811-16
https://notcve.org/view.php?id=CVE-2018-6459
20 Feb 2018 — The rsa_pss_params_parse function in libstrongswan/credentials/keys/signature_params.c in strongSwan 5.6.1 allows remote attackers to cause a denial of service via a crafted RSASSA-PSS signature that lacks a mask generation function parameter. La función rsa_pss_params_parse en libstrongswan/credentials/keys/signature_params.c en strong permite que atacantes remotos provoquen una denegación de servicio (DoS) mediante una firma RSASSA-PSS manipulada que carece de un parámetro de función de generación de másc... • http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00047.html • CWE-347: Improper Verification of Cryptographic Signature •
![](/assets/img/cve_300x82_sin_bg.png)
CVE-2015-3991
https://notcve.org/view.php?id=CVE-2015-3991
07 Sep 2017 — strongSwan 5.2.2 and 5.3.0 allows remote attackers to cause a denial of service (daemon crash) or execute arbitrary code. strongSwan 5.2.2 y 5.3.0 permite que los atacantes remotos provoquen una denegación de servicio (cierre inesperado de daemon) o ejecuten código arbitrario. • http://lists.fedoraproject.org/pipermail/package-announce/2015-August/164276.html • CWE-19: Data Processing Errors •
![](/assets/img/cve_300x82_sin_bg.png)
CVE-2017-11185 – Debian Security Advisory 3962-1
https://notcve.org/view.php?id=CVE-2017-11185
18 Aug 2017 — The gmp plugin in strongSwan before 5.6.0 allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) via a crafted RSA signature. El plugin gmp en strongSwan en versiones anteriores a la 5.6.0 permite que atacantes remotos provoquen una denegación de servicio (desreferencia de puntero NULL y daemon crash) mediante una firma RSA manipulada. A denial of service vulnerability was identified in strongSwan, an IKE/IPsec suite, using Google's OSS-Fuzz fuzzing project. • http://www.debian.org/security/2017/dsa-3962 • CWE-476: NULL Pointer Dereference •
![](/assets/img/cve_300x82_sin_bg.png)
CVE-2017-9023 – Debian Security Advisory 3866-1
https://notcve.org/view.php?id=CVE-2017-9023
30 May 2017 — The ASN.1 parser in strongSwan before 5.5.3 improperly handles CHOICE types when the x509 plugin is enabled, which allows remote attackers to cause a denial of service (infinite loop) via a crafted certificate. El analizador ASN.1 en strongSwan anterior a versión 5.5.3, maneja inapropiadamente los tipos CHOICE cuando el plugin x509 está habilitado, lo que permite a los atacantes remotos causar una denegación de servicio (bucle infinito) por medio de un certificado diseñado. It was discovered that the strong... • http://www.debian.org/security/2017/dsa-3866 • CWE-835: Loop with Unreachable Exit Condition ('Infinite Loop') •
![](/assets/img/cve_300x82_sin_bg.png)
CVE-2017-9022 – Debian Security Advisory 3866-1
https://notcve.org/view.php?id=CVE-2017-9022
30 May 2017 — The gmp plugin in strongSwan before 5.5.3 does not properly validate RSA public keys before calling mpz_powm_sec, which allows remote peers to cause a denial of service (floating point exception and process crash) via a crafted certificate. El plugin gmp en strnogSwan anterior a 5.5.3 no valida adecuadamente las claves públicas RSA tras la llamada mpz_powm_sec, lo que podría permitir a peers remotos causar una denegación de servicio (excepción de punto flotante y cierre inesperado del proceso) a través de u... • http://www.debian.org/security/2017/dsa-3866 • CWE-20: Improper Input Validation •
![](/assets/img/cve_300x82_sin_bg.png)
CVE-2015-8023 – Ubuntu Security Notice USN-2811-1
https://notcve.org/view.php?id=CVE-2015-8023
16 Nov 2015 — The server implementation of the EAP-MSCHAPv2 protocol in the eap-mschapv2 plugin in strongSwan 4.2.12 through 5.x before 5.3.4 does not properly validate local state, which allows remote attackers to bypass authentication via an empty Success message in response to an initial Challenge message. La implementación del servidor del protocolo EAP-MSCHAPv2 en el plugin eap-mschapv2 en strongSwan 4.2.12 hasta la versión 5.x en versiones anteriores a 5.3.4 no valida adecuadamente el estado local, lo que permite a... • http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00025.html • CWE-20: Improper Input Validation CWE-264: Permissions, Privileges, and Access Controls •
![](/assets/img/cve_300x82_sin_bg.png)
CVE-2015-4171 – Debian Security Advisory 3282-1
https://notcve.org/view.php?id=CVE-2015-4171
10 Jun 2015 — strongSwan 4.3.0 through 5.x before 5.3.2 and strongSwan VPN Client before 1.4.6, when using EAP or pre-shared keys for authenticating an IKEv2 connection, does not enforce server authentication restrictions until the entire authentication process is complete, which allows remote servers to obtain credentials by using a valid certificate and then reading the responses. strongSwan 4.3.0 hasta 5.x anterior a 5.3.2 y strongSwan VPN Client anterior a 1.4.6, cuando utiliza claves EAP o precompartidas para la aut... • http://lists.opensuse.org/opensuse-updates/2015-06/msg00040.html • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •
![](/assets/img/cve_300x82_sin_bg.png)
CVE-2014-9221 – Ubuntu Security Notice USN-2450-1
https://notcve.org/view.php?id=CVE-2014-9221
05 Jan 2015 — strongSwan 4.5.x through 5.2.x before 5.2.1 allows remote attackers to cause a denial of service (invalid pointer dereference) via a crafted IKEv2 Key Exchange (KE) message with Diffie-Hellman (DH) group 1025. strongSwan 4.5.x hasta 5.2.x anterior a 5.2.1 permite a atacantes remotos causar una denegación de servicio (referencia a puntero inválido) a través de un mensaje IKEv2 Key Exchange (KE) manipulado con el grupo Diffie-Hellman (DH) 1025. Mike Daskalakis discovered that strongSwan incorrectly handled IK... • http://lists.fedoraproject.org/pipermail/package-announce/2015-March/153825.html • CWE-19: Data Processing Errors •
![](/assets/img/cve_300x82_sin_bg.png)
CVE-2014-2891 – Debian Security Advisory 2922-1
https://notcve.org/view.php?id=CVE-2014-2891
06 May 2014 — strongSwan before 5.1.2 allows remote attackers to cause a denial of service (NULL pointer dereference and IKE daemon crash) via a crafted ID_DER_ASN1_DN ID payload. strongSwan en versiones anteriores a 5.1.2 permite a atacantes remotos provocar una denegación de servicio (referencia a puntero null y una caída del demonio IKE) a través de un payload IDER_ASN1_DN ID manipulado. Two vulnerabilities have been found in strongSwan, possibly resulting in Denial of Service or a bypass in authentication restriction... • http://lists.opensuse.org/opensuse-updates/2014-05/msg00064.html •
![](/assets/img/cve_300x82_sin_bg.png)
CVE-2014-2338 – Gentoo Linux Security Advisory 201412-26
https://notcve.org/view.php?id=CVE-2014-2338
15 Apr 2014 — IKEv2 in strongSwan 4.0.7 before 5.1.3 allows remote attackers to bypass authentication by rekeying an IKE_SA during (1) initiation or (2) re-authentication, which triggers the IKE_SA state to be set to established. IKEv2 en strongSwan 4.0.7 anterior a 5.1.3 permite a atacantes remotos evadir autenticación mediante la recodificación de un IKE_SA durante (1) iniciación o (2) re-autenticación, lo que provoca el estado de IKE_SA sea configurado como establecido. An authentication bypass vulnerability was found... • http://lists.opensuse.org/opensuse-security-announce/2014-04/msg00010.html • CWE-287: Improper Authentication •