CVE-2010-2628

EUVD-2010-2632
The IKE daemon in strongSwan 4.3.x before 4.3.7 and 4.4.x before 4.4.1 does not properly check the return values of snprintf calls, which allows remote attackers to execute arbitrary code via crafted (1) certificate or (2) identity data that triggers buffer overflows.
Code Injection
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTPrimary
7.5 UNKNOWN
NETWORK
LOW
AV:N/AC:L/Au:N/C:P/I:P/A:P
Base Score
CVSS 3.x
EPSS Score
Percentile: 90%
Affected Products (NVD)
VendorProductVersion
strongswanstrongswan
4.3.0
strongswanstrongswan
4.3.1
strongswanstrongswan
4.3.2
strongswanstrongswan
4.3.3
strongswanstrongswan
4.3.4
strongswanstrongswan
4.3.5
strongswanstrongswan
4.3.6
strongswanstrongswan
4.4.0
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
strongswan
bookworm
5.9.8-5+deb12u1
fixed
bookworm (security)
5.9.8-5+deb12u1
fixed
bullseye
5.9.1-1+deb11u4
fixed
bullseye (security)
5.9.1-1+deb11u4
fixed
lenny
not-affected
sid
5.9.13-2
fixed
squeeze
not-affected
trixie
5.9.13-2
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
strongswan
dapper
dne
hardy
ignored
jaunty
ignored
karmic
ignored
lucid
ignored
maverick
ignored
natty
not-affected
oneiric
not-affected
precise
not-affected
quantal
not-affected
raring
not-affected
saucy
not-affected
References