CVE-2022-40617
31.10.2022, 06:15
strongSwan before 5.9.8 allows remote attackers to cause a denial of service in the revocation plugin by sending a crafted end-entity (and intermediate CA) certificate that contains a CRL/OCSP URL that points to a server (under the attacker's control) that doesn't properly respond but (for example) just does nothing after the initial TCP handshake, or sends an excessive amount of application data.Enginsight
Vendor | Product | Version |
---|---|---|
strongswan | strongswan | 𝑥 < 5.9.8 |
canonical | ubuntu_linux | 14.04 |
canonical | ubuntu_linux | 16.04 |
canonical | ubuntu_linux | 18.04 |
canonical | ubuntu_linux | 20.04 |
canonical | ubuntu_linux | 22.04 |
debian | debian_linux | 10.0 |
debian | debian_linux | 11.0 |
stormshield | stormshield_network_security | 3.11.1 ≤ 𝑥 < 3.11.20 |
stormshield | stormshield_network_security | 4.3.1 ≤ 𝑥 < 4.3.15 |
stormshield | stormshield_network_security | 4.5.1 ≤ 𝑥 < 4.6.0 |
𝑥
= Vulnerable software versions

Debian Releases

Ubuntu Releases
Ubuntu Product | |||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
strongswan |
|
References