Page 4 of 17 results (0.002 seconds)

CVSS: 5.0EPSS: 84%CPEs: 60EXPL: 0

The pluto IKE daemon in Openswan and Strongswan IPsec 2.6 before 2.6.21 and 2.4 before 2.4.14, and Strongswan 4.2 before 4.2.14 and 2.8 before 2.8.9, allows remote attackers to cause a denial of service (daemon crash and restart) via a crafted (1) R_U_THERE or (2) R_U_THERE_ACK Dead Peer Detection (DPD) IPsec IKE Notification message that triggers a NULL pointer dereference related to inconsistent ISAKMP state and the lack of a phase2 state association in DPD. El demonio IKE pluto de Openswan y Strongswan IPsec v2.6 anterior a v2.6.21 y v2.4 anterior a v2.4.14, y Strongswan v4.2 anterior a v4.2.14 y v2.8 anteior a v2.8.9; permite a atacantes remotos provocar una denegación de servicio (caída del demonio y reinicio) a través de (1) R_U_THERE o (2) R_U_THERE_ACK Detección de pares muertos (Dead Peer Detection -DPD) mensaje de Notificación IKE IPsec que provoca una referencia a puntero nulo relacionado con el estado inconsistente ISAKMP y la falta de un estado de asociacion phase2 en DPD. • http://download.strongswan.org/CHANGES4.txt http://lists.opensuse.org/opensuse-security-announce/2009-04/msg00010.html http://secunia.com/advisories/34472 http://secunia.com/advisories/34483 http://secunia.com/advisories/34494 http://secunia.com/advisories/34546 http://www.debian.org/security/2009/dsa-1759 http://www.debian.org/security/2009/dsa-1760 http://www.openswan.org/CVE-2009-0790/CVE-2009-0790.txt http://www.redhat.com/support/errata/RHSA-2009-0402.html http:/ • CWE-20: Improper Input Validation •

CVSS: 5.0EPSS: 2%CPEs: 61EXPL: 0

strongSwan 4.2.6 and earlier allows remote attackers to cause a denial of service (daemon crash) via an IKE_SA_INIT message with a large number of NULL values in a Key Exchange payload, which triggers a NULL pointer dereference for the return value of the mpz_export function in the GNU Multiprecision Library (GMP). strongSwan 4.2.6 y anteriores permite a atacantes remotos provocar una denegación de servicio (caída del demonio) mediante un mensaje con un número grande de valores NULL en una carga útil Key Exchange, lo que dispara una referencia a un puntero NULL para el valor de retorno de la función mpz_export en la GNU Multiprecision Library (GMP) (Biblioteca de Multiprecisión GNU). • http://download.strongswan.org/CHANGES4.txt http://labs.mudynamics.com/advisories/MU-200809-01.txt http://secunia.com/advisories/31963 http://www.securityfocus.com/bid/31291 http://www.securitytracker.com/id?1020903 http://www.vupen.com/english/advisories/2008/2660 • CWE-399: Resource Management Errors •