Page 2 of 19 results (0.016 seconds)

CVSS: 7.5EPSS: 0%CPEs: 7EXPL: 0

30 May 2017 — The gmp plugin in strongSwan before 5.5.3 does not properly validate RSA public keys before calling mpz_powm_sec, which allows remote peers to cause a denial of service (floating point exception and process crash) via a crafted certificate. El plugin gmp en strnogSwan anterior a 5.5.3 no valida adecuadamente las claves públicas RSA tras la llamada mpz_powm_sec, lo que podría permitir a peers remotos causar una denegación de servicio (excepción de punto flotante y cierre inesperado del proceso) a través de u... • http://www.debian.org/security/2017/dsa-3866 • CWE-20: Improper Input Validation •

CVSS: 9.8EPSS: 0%CPEs: 44EXPL: 0

16 Nov 2015 — The server implementation of the EAP-MSCHAPv2 protocol in the eap-mschapv2 plugin in strongSwan 4.2.12 through 5.x before 5.3.4 does not properly validate local state, which allows remote attackers to bypass authentication via an empty Success message in response to an initial Challenge message. La implementación del servidor del protocolo EAP-MSCHAPv2 en el plugin eap-mschapv2 en strongSwan 4.2.12 hasta la versión 5.x en versiones anteriores a 5.3.4 no valida adecuadamente el estado local, lo que permite a... • http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00025.html • CWE-20: Improper Input Validation CWE-264: Permissions, Privileges, and Access Controls •

CVSS: 9.1EPSS: 1%CPEs: 39EXPL: 0

10 Jun 2015 — strongSwan 4.3.0 through 5.x before 5.3.2 and strongSwan VPN Client before 1.4.6, when using EAP or pre-shared keys for authenticating an IKEv2 connection, does not enforce server authentication restrictions until the entire authentication process is complete, which allows remote servers to obtain credentials by using a valid certificate and then reading the responses. strongSwan 4.3.0 hasta 5.x anterior a 5.3.2 y strongSwan VPN Client anterior a 1.4.6, cuando utiliza claves EAP o precompartidas para la aut... • http://lists.opensuse.org/opensuse-updates/2015-06/msg00040.html • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •

CVSS: 7.5EPSS: 7%CPEs: 25EXPL: 0

05 Jan 2015 — strongSwan 4.5.x through 5.2.x before 5.2.1 allows remote attackers to cause a denial of service (invalid pointer dereference) via a crafted IKEv2 Key Exchange (KE) message with Diffie-Hellman (DH) group 1025. strongSwan 4.5.x hasta 5.2.x anterior a 5.2.1 permite a atacantes remotos causar una denegación de servicio (referencia a puntero inválido) a través de un mensaje IKEv2 Key Exchange (KE) manipulado con el grupo Diffie-Hellman (DH) 1025. Mike Daskalakis discovered that strongSwan incorrectly handled IK... • http://lists.fedoraproject.org/pipermail/package-announce/2015-March/153825.html • CWE-19: Data Processing Errors •

CVSS: 7.5EPSS: 1%CPEs: 8EXPL: 0

06 May 2014 — strongSwan before 5.1.2 allows remote attackers to cause a denial of service (NULL pointer dereference and IKE daemon crash) via a crafted ID_DER_ASN1_DN ID payload. strongSwan en versiones anteriores a 5.1.2 permite a atacantes remotos provocar una denegación de servicio (referencia a puntero null y una caída del demonio IKE) a través de un payload IDER_ASN1_DN ID manipulado. Two vulnerabilities have been found in strongSwan, possibly resulting in Denial of Service or a bypass in authentication restriction... • http://lists.opensuse.org/opensuse-updates/2014-05/msg00064.html •

CVSS: 9.8EPSS: 0%CPEs: 57EXPL: 0

15 Apr 2014 — IKEv2 in strongSwan 4.0.7 before 5.1.3 allows remote attackers to bypass authentication by rekeying an IKE_SA during (1) initiation or (2) re-authentication, which triggers the IKE_SA state to be set to established. IKEv2 en strongSwan 4.0.7 anterior a 5.1.3 permite a atacantes remotos evadir autenticación mediante la recodificación de un IKE_SA durante (1) iniciación o (2) re-autenticación, lo que provoca el estado de IKE_SA sea configurado como establecido. An authentication bypass vulnerability was found... • http://lists.opensuse.org/opensuse-security-announce/2014-04/msg00010.html • CWE-287: Improper Authentication •

CVSS: 7.5EPSS: 0%CPEs: 22EXPL: 0

02 Nov 2013 — The compare_dn function in utils/identification.c in strongSwan 4.3.3 through 5.1.1 allows (1) remote attackers to cause a denial of service (out-of-bounds read, NULL pointer dereference, and daemon crash) or (2) remote authenticated users to impersonate arbitrary users and bypass access restrictions via a crafted ID_DER_ASN1_DN ID, related to an "insufficient length check" during identity comparison. La función compare_dn en utils/identification.c en strongSwan 4.3.3 hasta la versión 5.1.1 permite (1) a at... • http://download.strongswan.org/security/CVE-2013-6075/strongswan-4.3.3-5.1.0_id_dn_match.patch • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 7.5EPSS: 0%CPEs: 4EXPL: 0

02 Nov 2013 — strongSwan 5.0.2 through 5.1.0 allows remote attackers to cause a denial of service (NULL pointer dereference and charon daemon crash) via a crafted IKEv1 fragmentation packet. strongSwan 5.0.2 hasta la versión 5.1.0 permite a atacantes remotos provocar una denegación de servicio (referencia a un puntero NULL y caída del demonio charon) a través de un paquete de fragmentación elaborado IKEv1. • http://www.strongswan.org/blog/2013/11/01/strongswan-denial-of-service-vulnerability-%28cve-2013-6076%29.html •

CVSS: 7.5EPSS: 2%CPEs: 9EXPL: 1

28 Aug 2013 — The is_asn1 function in strongSwan 4.1.11 through 5.0.4 does not properly validate the return value of the asn1_length function, which allows remote attackers to cause a denial of service (segmentation fault) via a (1) XAuth username, (2) EAP identity, or (3) PEM encoded file that starts with a 0x04, 0x30, or 0x31 character followed by an ASN.1 length value that triggers an integer overflow. La función is_asn1 en strongSwan v4.1.11 hasta v5.0.4 no valida correctamente el valor de retorno de la función asn1_... • http://lists.opensuse.org/opensuse-updates/2013-08/msg00021.html • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •