Show filters
37 Total Results
Displaying 11-20 of 37
Sort by:
Attacker Value
Unknown
CVE-2018-16151
Disclosure Date: September 26, 2018 (last updated November 08, 2023)
In verify_emsa_pkcs1_signature() in gmp_rsa_public_key.c in the gmp plugin in strongSwan 4.x and 5.x before 5.7.0, the RSA implementation based on GMP does not reject excess data after the encoded algorithm OID during PKCS#1 v1.5 signature verification. Similar to the flaw in the same version of strongSwan regarding digestAlgorithm.parameters, a remote attacker can forge signatures when small public exponents are being used, which could lead to impersonation when only an RSA signature is used for IKEv2 authentication.
0
Attacker Value
Unknown
CVE-2018-10811
Disclosure Date: June 19, 2018 (last updated November 08, 2023)
strongSwan 5.6.0 and older allows Remote Denial of Service because of Missing Initialization of a Variable.
0
Attacker Value
Unknown
CVE-2018-5388
Disclosure Date: May 31, 2018 (last updated November 08, 2023)
In stroke_socket.c in strongSwan before 5.6.3, a missing packet length check could allow a buffer underflow, which may lead to resource exhaustion and denial of service while reading from the socket.
0
Attacker Value
Unknown
CVE-2018-6459
Disclosure Date: February 20, 2018 (last updated November 08, 2023)
The rsa_pss_params_parse function in libstrongswan/credentials/keys/signature_params.c in strongSwan 5.6.1 allows remote attackers to cause a denial of service via a crafted RSASSA-PSS signature that lacks a mask generation function parameter.
0
Attacker Value
Unknown
CVE-2015-3991
Disclosure Date: September 07, 2017 (last updated November 08, 2023)
strongSwan 5.2.2 and 5.3.0 allows remote attackers to cause a denial of service (daemon crash) or execute arbitrary code.
0
Attacker Value
Unknown
CVE-2017-11185
Disclosure Date: August 18, 2017 (last updated November 08, 2023)
The gmp plugin in strongSwan before 5.6.0 allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) via a crafted RSA signature.
0
Attacker Value
Unknown
CVE-2017-9023
Disclosure Date: June 08, 2017 (last updated November 08, 2023)
The ASN.1 parser in strongSwan before 5.5.3 improperly handles CHOICE types when the x509 plugin is enabled, which allows remote attackers to cause a denial of service (infinite loop) via a crafted certificate.
0
Attacker Value
Unknown
CVE-2017-9022
Disclosure Date: June 08, 2017 (last updated November 08, 2023)
The gmp plugin in strongSwan before 5.5.3 does not properly validate RSA public keys before calling mpz_powm_sec, which allows remote peers to cause a denial of service (floating point exception and process crash) via a crafted certificate.
0
Attacker Value
Unknown
CVE-2015-8023
Disclosure Date: November 18, 2015 (last updated October 05, 2023)
The server implementation of the EAP-MSCHAPv2 protocol in the eap-mschapv2 plugin in strongSwan 4.2.12 through 5.x before 5.3.4 does not properly validate local state, which allows remote attackers to bypass authentication via an empty Success message in response to an initial Challenge message.
0
Attacker Value
Unknown
CVE-2015-4171
Disclosure Date: June 10, 2015 (last updated October 05, 2023)
strongSwan 4.3.0 through 5.x before 5.3.2 and strongSwan VPN Client before 1.4.6, when using EAP or pre-shared keys for authenticating an IKEv2 connection, does not enforce server authentication restrictions until the entire authentication process is complete, which allows remote servers to obtain credentials by using a valid certificate and then reading the responses.
0