CVE-2013-2944

strongSwan 4.3.5 through 5.0.3, when using the OpenSSL plugin for ECDSA signature verification, allows remote attackers to authenticate as other users via an invalid signature.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTNIST
4.9 UNKNOWN
NETWORK
MEDIUM
AV:N/AC:M/Au:S/C:P/I:P/A:N
mitreCNA
---
---
CVEADP
---
---
Base Score
CVSS 3.x
EPSS Score
Percentile: 54%
VendorProductVersion
strongswanstrongswan
4.3.5
strongswanstrongswan
4.3.6
strongswanstrongswan
4.3.7
strongswanstrongswan
4.4.0
strongswanstrongswan
4.4.1
strongswanstrongswan
4.5.0
strongswanstrongswan
4.5.1
strongswanstrongswan
4.5.2
strongswanstrongswan
4.5.3
strongswanstrongswan
4.6.0
strongswanstrongswan
4.6.1
strongswanstrongswan
4.6.2
strongswanstrongswan
4.6.3
strongswanstrongswan
4.6.4
strongswanstrongswan
5.0.0
strongswanstrongswan
5.0.1
strongswanstrongswan
5.0.2
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
strongswan
bullseye (security)
5.9.1-1+deb11u4
fixed
bullseye
5.9.1-1+deb11u4
fixed
bookworm
5.9.8-5+deb12u1
fixed
bookworm (security)
5.9.8-5+deb12u1
fixed
sid
5.9.13-2
fixed
trixie
5.9.13-2
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
strongswan
zesty
not-affected
yakkety
not-affected
xenial
not-affected
wily
not-affected
vivid
not-affected
utopic
not-affected
trusty
not-affected
saucy
not-affected
raring
ignored
quantal
ignored
precise
ignored
oneiric
ignored
lucid
ignored
hardy
ignored