CVE-2009-2661
04.08.2009, 16:30
The asn1_length function in strongSwan 2.8 before 2.8.11, 4.2 before 4.2.17, and 4.3 before 4.3.3 does not properly handle X.509 certificates with crafted Relative Distinguished Names (RDNs), which allows remote attackers to cause a denial of service (pluto IKE daemon crash) via malformed ASN.1 data. NOTE: this is due to an incomplete fix for CVE-2009-2185.Enginsight
Vendor | Product | Version |
---|---|---|
strongswan | strongswan | 2.8.0 |
strongswan | strongswan | 2.8.1 |
strongswan | strongswan | 2.8.2 |
strongswan | strongswan | 2.8.3 |
strongswan | strongswan | 2.8.4 |
strongswan | strongswan | 2.8.5 |
strongswan | strongswan | 2.8.6 |
strongswan | strongswan | 2.8.7 |
strongswan | strongswan | 2.8.8 |
strongswan | strongswan | 2.8.10 |
strongswan | strongswan | 4.2.0 |
strongswan | strongswan | 4.2.1 |
strongswan | strongswan | 4.2.2 |
strongswan | strongswan | 4.2.3 |
strongswan | strongswan | 4.2.10 |
strongswan | strongswan | 4.2.11 |
strongswan | strongswan | 4.2.12 |
strongswan | strongswan | 4.2.13 |
strongswan | strongswan | 4.2.14 |
strongswan | strongswan | 4.2.15 |
strongswan | strongswan | 4.2.16 |
strongswan | strongswan | 4.3.0 |
strongswan | strongswan | 4.3.1 |
strongswan | strongswan | 4.3.2 |
𝑥
= Vulnerable software versions

Debian Releases

Ubuntu Releases
Common Weakness Enumeration
References