CVE-2018-5388

EUVD-2018-17158
In stroke_socket.c in strongSwan before 5.6.3, a missing packet length check could allow a buffer underflow, which may lead to resource exhaustion and denial of service while reading from the socket.
Buffer Underflow
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTPrimary
6.5 MEDIUM
NETWORK
LOW
LOW
CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
Base Score
CVSS 3.x
EPSS Score
Percentile: 88%
Affected Products (NVD)
VendorProductVersion
strongswanstrongswan
𝑥
< 5.6.3
debiandebian_linux
8.0
debiandebian_linux
9.0
canonicalubuntu_linux
14.04
canonicalubuntu_linux
16.04
canonicalubuntu_linux
18.04
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
strongswan
bookworm
5.9.8-5+deb12u1
fixed
bookworm (security)
5.9.8-5+deb12u1
fixed
bullseye
5.9.1-1+deb11u4
fixed
bullseye (security)
5.9.1-1+deb11u4
fixed
jessie
no-dsa
sid
5.9.13-2
fixed
stretch
no-dsa
trixie
5.9.13-2
fixed
wheezy
no-dsa
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
strongswan
artful
ignored
bionic
Fixed 5.6.2-1ubuntu2.2
released
trusty
Fixed 5.1.2-0ubuntu2.10
released
xenial
Fixed 5.3.5-1ubuntu3.7
released