CVE-2010-2628

The IKE daemon in strongSwan 4.3.x before 4.3.7 and 4.4.x before 4.4.1 does not properly check the return values of snprintf calls, which allows remote attackers to execute arbitrary code via crafted (1) certificate or (2) identity data that triggers buffer overflows.
Code Injection
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTNIST
7.5 UNKNOWN
NETWORK
LOW
AV:N/AC:L/Au:N/C:P/I:P/A:P
mitreCNA
---
---
CVEADP
---
---
Base Score
CVSS 3.x
EPSS Score
Percentile: 89%
VendorProductVersion
strongswanstrongswan
4.3.0
strongswanstrongswan
4.3.1
strongswanstrongswan
4.3.2
strongswanstrongswan
4.3.3
strongswanstrongswan
4.3.4
strongswanstrongswan
4.3.5
strongswanstrongswan
4.3.6
strongswanstrongswan
4.4.0
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
strongswan
bullseye (security)
5.9.1-1+deb11u4
fixed
bullseye
5.9.1-1+deb11u4
fixed
lenny
not-affected
squeeze
not-affected
bookworm
5.9.8-5+deb12u1
fixed
bookworm (security)
5.9.8-5+deb12u1
fixed
sid
5.9.13-2
fixed
trixie
5.9.13-2
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
strongswan
saucy
not-affected
raring
not-affected
quantal
not-affected
precise
not-affected
oneiric
not-affected
natty
not-affected
maverick
ignored
lucid
ignored
karmic
ignored
jaunty
ignored
hardy
ignored
dapper
dne
References