[Forgot Password]
Login  Register Subscribe

30481

 
 

423868

 
 

256148

 
 

909

 
 

199106

 
 

282

Paid content will be excluded from the download.


Download | Alert*
OVAL

DSA-5560-1 strongswan -- strongswan

ID: oval:org.secpod.oval:def:612804Date: (C)2023-11-24   (M)2024-06-19
Class: PATCHFamily: unix




Florian Picca reported a bug the charon-tkm daemon in strongSwan an IKE/IPsec suite. The TKM-backed version of the charon IKE daemon doesn"t check the length of received Diffie-Hellman public values before copying them to a fixed-size buffer on the stack, causing a buffer overflow that could potentially be exploited for remote code execution by sending a specially crafted and unauthenticated IKE_SA_INIT message.

Platform:
Debian 12.x
Debian 11.x
Product:
libcharon-extra-plugins
libstrongswan
libcharon-extauth-plugins
charon-systemd
strongswan
charon-cmd
Reference:
DSA-5560-1
CVE-2023-41913
CVE    1
CVE-2023-41913

© SecPod Technologies