CVE-2009-0790

The pluto IKE daemon in Openswan and Strongswan IPsec 2.6 before 2.6.21 and 2.4 before 2.4.14, and Strongswan 4.2 before 4.2.14 and 2.8 before 2.8.9, allows remote attackers to cause a denial of service (daemon crash and restart) via a crafted (1) R_U_THERE or (2) R_U_THERE_ACK Dead Peer Detection (DPD) IPsec IKE Notification message that triggers a NULL pointer dereference related to inconsistent ISAKMP state and the lack of a phase2 state association in DPD.
References
Link Resource
http://download.strongswan.org/CHANGES4.txt Vendor Advisory
http://lists.opensuse.org/opensuse-security-announce/2009-04/msg00010.html
http://secunia.com/advisories/34472 Vendor Advisory
http://secunia.com/advisories/34483 Vendor Advisory
http://secunia.com/advisories/34494 Vendor Advisory
http://secunia.com/advisories/34546 Vendor Advisory
http://www.debian.org/security/2009/dsa-1759 Patch
http://www.debian.org/security/2009/dsa-1760 Patch
http://www.openswan.org/CVE-2009-0790/CVE-2009-0790.txt Vendor Advisory
http://www.redhat.com/support/errata/RHSA-2009-0402.html
http://www.securityfocus.com/archive/1/502270/100/0/threaded
http://www.securityfocus.com/bid/34296 Patch
http://www.securitytracker.com/id?1021949
http://www.securitytracker.com/id?1021950
http://www.vupen.com/english/advisories/2009/0886
https://exchange.xforce.ibmcloud.com/vulnerabilities/49523
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11171
http://download.strongswan.org/CHANGES4.txt Vendor Advisory
http://lists.opensuse.org/opensuse-security-announce/2009-04/msg00010.html
http://secunia.com/advisories/34472 Vendor Advisory
http://secunia.com/advisories/34483 Vendor Advisory
http://secunia.com/advisories/34494 Vendor Advisory
http://secunia.com/advisories/34546 Vendor Advisory
http://www.debian.org/security/2009/dsa-1759 Patch
http://www.debian.org/security/2009/dsa-1760 Patch
http://www.openswan.org/CVE-2009-0790/CVE-2009-0790.txt Vendor Advisory
http://www.redhat.com/support/errata/RHSA-2009-0402.html
http://www.securityfocus.com/archive/1/502270/100/0/threaded
http://www.securityfocus.com/bid/34296 Patch
http://www.securitytracker.com/id?1021949
http://www.securitytracker.com/id?1021950
http://www.vupen.com/english/advisories/2009/0886
https://exchange.xforce.ibmcloud.com/vulnerabilities/49523
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11171
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:strongswan:strongswan:2.4.0:*:*:*:*:*:*:*
cpe:2.3:a:strongswan:strongswan:2.4.0a:*:*:*:*:*:*:*
cpe:2.3:a:strongswan:strongswan:2.4.1:*:*:*:*:*:*:*
cpe:2.3:a:strongswan:strongswan:2.4.2:*:*:*:*:*:*:*
cpe:2.3:a:strongswan:strongswan:2.4.3:*:*:*:*:*:*:*
cpe:2.3:a:strongswan:strongswan:2.4.4:*:*:*:*:*:*:*
cpe:2.3:a:strongswan:strongswan:2.6.0:*:*:*:*:*:*:*
cpe:2.3:a:strongswan:strongswan:2.6.1:*:*:*:*:*:*:*
cpe:2.3:a:strongswan:strongswan:2.6.2:*:*:*:*:*:*:*
cpe:2.3:a:strongswan:strongswan:2.6.3:*:*:*:*:*:*:*
cpe:2.3:a:strongswan:strongswan:2.6.4:*:*:*:*:*:*:*
cpe:2.3:a:strongswan:strongswan:2.8.0:*:*:*:*:*:*:*
cpe:2.3:a:strongswan:strongswan:2.8.1:*:*:*:*:*:*:*
cpe:2.3:a:strongswan:strongswan:2.8.2:*:*:*:*:*:*:*
cpe:2.3:a:strongswan:strongswan:2.8.3:*:*:*:*:*:*:*
cpe:2.3:a:strongswan:strongswan:2.8.4:*:*:*:*:*:*:*
cpe:2.3:a:strongswan:strongswan:2.8.5:*:*:*:*:*:*:*
cpe:2.3:a:strongswan:strongswan:2.8.6:*:*:*:*:*:*:*
cpe:2.3:a:strongswan:strongswan:2.8.7:*:*:*:*:*:*:*
cpe:2.3:a:strongswan:strongswan:2.8.8:*:*:*:*:*:*:*
cpe:2.3:a:strongswan:strongswan:4.2.0:*:*:*:*:*:*:*
cpe:2.3:a:strongswan:strongswan:4.2.1:*:*:*:*:*:*:*
cpe:2.3:a:strongswan:strongswan:4.2.2:*:*:*:*:*:*:*
cpe:2.3:a:strongswan:strongswan:4.2.3:*:*:*:*:*:*:*
cpe:2.3:a:strongswan:strongswan:4.2.4:*:*:*:*:*:*:*
cpe:2.3:a:strongswan:strongswan:4.2.5:*:*:*:*:*:*:*
cpe:2.3:a:strongswan:strongswan:4.2.6:*:*:*:*:*:*:*
cpe:2.3:a:strongswan:strongswan:4.2.7:*:*:*:*:*:*:*
cpe:2.3:a:strongswan:strongswan:4.2.8:*:*:*:*:*:*:*
cpe:2.3:a:strongswan:strongswan:4.2.9:*:*:*:*:*:*:*
cpe:2.3:a:strongswan:strongswan:4.2.10:*:*:*:*:*:*:*
cpe:2.3:a:strongswan:strongswan:4.2.11:*:*:*:*:*:*:*
cpe:2.3:a:strongswan:strongswan:4.2.12:*:*:*:*:*:*:*
cpe:2.3:a:strongswan:strongswan:4.2.13:*:*:*:*:*:*:*
cpe:2.3:a:xelerance:openswan:2.4.0:*:*:*:*:*:*:*
cpe:2.3:a:xelerance:openswan:2.4.1:*:*:*:*:*:*:*
cpe:2.3:a:xelerance:openswan:2.4.2:*:*:*:*:*:*:*
cpe:2.3:a:xelerance:openswan:2.4.3:*:*:*:*:*:*:*
cpe:2.3:a:xelerance:openswan:2.4.4:*:*:*:*:*:*:*
cpe:2.3:a:xelerance:openswan:2.4.5:*:*:*:*:*:*:*
cpe:2.3:a:xelerance:openswan:2.4.9:*:*:*:*:*:*:*
cpe:2.3:a:xelerance:openswan:2.4.10:*:*:*:*:*:*:*
cpe:2.3:a:xelerance:openswan:2.6.03:*:*:*:*:*:*:*
cpe:2.3:a:xelerance:openswan:2.6.04:*:*:*:*:*:*:*
cpe:2.3:a:xelerance:openswan:2.6.05:*:*:*:*:*:*:*
cpe:2.3:a:xelerance:openswan:2.6.06:*:*:*:*:*:*:*
cpe:2.3:a:xelerance:openswan:2.6.07:*:*:*:*:*:*:*
cpe:2.3:a:xelerance:openswan:2.6.08:*:*:*:*:*:*:*
cpe:2.3:a:xelerance:openswan:2.6.09:*:*:*:*:*:*:*
cpe:2.3:a:xelerance:openswan:2.6.10:*:*:*:*:*:*:*
cpe:2.3:a:xelerance:openswan:2.6.11:*:*:*:*:*:*:*
cpe:2.3:a:xelerance:openswan:2.6.12:*:*:*:*:*:*:*
cpe:2.3:a:xelerance:openswan:2.6.13:*:*:*:*:*:*:*
cpe:2.3:a:xelerance:openswan:2.6.14:*:*:*:*:*:*:*
cpe:2.3:a:xelerance:openswan:2.6.15:*:*:*:*:*:*:*
cpe:2.3:a:xelerance:openswan:2.6.16:*:*:*:*:*:*:*
cpe:2.3:a:xelerance:openswan:2.6.17:*:*:*:*:*:*:*
cpe:2.3:a:xelerance:openswan:2.6.18:*:*:*:*:*:*:*
cpe:2.3:a:xelerance:openswan:2.6.19:*:*:*:*:*:*:*
cpe:2.3:a:xelerance:openswan:2.6.20:*:*:*:*:*:*:*

History

21 Nov 2024, 01:00

Type Values Removed Values Added
References () http://download.strongswan.org/CHANGES4.txt - Vendor Advisory () http://download.strongswan.org/CHANGES4.txt - Vendor Advisory
References () http://lists.opensuse.org/opensuse-security-announce/2009-04/msg00010.html - () http://lists.opensuse.org/opensuse-security-announce/2009-04/msg00010.html -
References () http://secunia.com/advisories/34472 - Vendor Advisory () http://secunia.com/advisories/34472 - Vendor Advisory
References () http://secunia.com/advisories/34483 - Vendor Advisory () http://secunia.com/advisories/34483 - Vendor Advisory
References () http://secunia.com/advisories/34494 - Vendor Advisory () http://secunia.com/advisories/34494 - Vendor Advisory
References () http://secunia.com/advisories/34546 - Vendor Advisory () http://secunia.com/advisories/34546 - Vendor Advisory
References () http://www.debian.org/security/2009/dsa-1759 - Patch () http://www.debian.org/security/2009/dsa-1759 - Patch
References () http://www.debian.org/security/2009/dsa-1760 - Patch () http://www.debian.org/security/2009/dsa-1760 - Patch
References () http://www.openswan.org/CVE-2009-0790/CVE-2009-0790.txt - Vendor Advisory () http://www.openswan.org/CVE-2009-0790/CVE-2009-0790.txt - Vendor Advisory
References () http://www.redhat.com/support/errata/RHSA-2009-0402.html - () http://www.redhat.com/support/errata/RHSA-2009-0402.html -
References () http://www.securityfocus.com/archive/1/502270/100/0/threaded - () http://www.securityfocus.com/archive/1/502270/100/0/threaded -
References () http://www.securityfocus.com/bid/34296 - Patch () http://www.securityfocus.com/bid/34296 - Patch
References () http://www.securitytracker.com/id?1021949 - () http://www.securitytracker.com/id?1021949 -
References () http://www.securitytracker.com/id?1021950 - () http://www.securitytracker.com/id?1021950 -
References () http://www.vupen.com/english/advisories/2009/0886 - () http://www.vupen.com/english/advisories/2009/0886 -
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/49523 - () https://exchange.xforce.ibmcloud.com/vulnerabilities/49523 -
References () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11171 - () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11171 -

Information

Published : 2009-04-01 10:30

Updated : 2024-11-21 01:00


NVD link : CVE-2009-0790

Mitre link : CVE-2009-0790

CVE.ORG link : CVE-2009-0790


JSON object : View

Products Affected

xelerance

  • openswan

strongswan

  • strongswan
CWE
CWE-20

Improper Input Validation