CVE-2009-2661

The asn1_length function in strongSwan 2.8 before 2.8.11, 4.2 before 4.2.17, and 4.3 before 4.3.3 does not properly handle X.509 certificates with crafted Relative Distinguished Names (RDNs), which allows remote attackers to cause a denial of service (pluto IKE daemon crash) via malformed ASN.1 data. NOTE: this is due to an incomplete fix for CVE-2009-2185.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:strongswan:strongswan:2.8.0:*:*:*:*:*:*:*
cpe:2.3:a:strongswan:strongswan:2.8.1:*:*:*:*:*:*:*
cpe:2.3:a:strongswan:strongswan:2.8.2:*:*:*:*:*:*:*
cpe:2.3:a:strongswan:strongswan:2.8.3:*:*:*:*:*:*:*
cpe:2.3:a:strongswan:strongswan:2.8.4:*:*:*:*:*:*:*
cpe:2.3:a:strongswan:strongswan:2.8.5:*:*:*:*:*:*:*
cpe:2.3:a:strongswan:strongswan:2.8.6:*:*:*:*:*:*:*
cpe:2.3:a:strongswan:strongswan:2.8.7:*:*:*:*:*:*:*
cpe:2.3:a:strongswan:strongswan:2.8.8:*:*:*:*:*:*:*
cpe:2.3:a:strongswan:strongswan:2.8.10:*:*:*:*:*:*:*
cpe:2.3:a:strongswan:strongswan:4.2.0:*:*:*:*:*:*:*
cpe:2.3:a:strongswan:strongswan:4.2.1:*:*:*:*:*:*:*
cpe:2.3:a:strongswan:strongswan:4.2.2:*:*:*:*:*:*:*
cpe:2.3:a:strongswan:strongswan:4.2.3:*:*:*:*:*:*:*
cpe:2.3:a:strongswan:strongswan:4.2.10:*:*:*:*:*:*:*
cpe:2.3:a:strongswan:strongswan:4.2.11:*:*:*:*:*:*:*
cpe:2.3:a:strongswan:strongswan:4.2.12:*:*:*:*:*:*:*
cpe:2.3:a:strongswan:strongswan:4.2.13:*:*:*:*:*:*:*
cpe:2.3:a:strongswan:strongswan:4.2.14:*:*:*:*:*:*:*
cpe:2.3:a:strongswan:strongswan:4.2.15:*:*:*:*:*:*:*
cpe:2.3:a:strongswan:strongswan:4.2.16:*:*:*:*:*:*:*
cpe:2.3:a:strongswan:strongswan:4.3.0:*:*:*:*:*:*:*
cpe:2.3:a:strongswan:strongswan:4.3.1:*:*:*:*:*:*:*
cpe:2.3:a:strongswan:strongswan:4.3.2:*:*:*:*:*:*:*

History

21 Nov 2024, 01:05

Type Values Removed Values Added
References () http://download.strongswan.org/patches/07_asn1_length_patch/strongswan-4.3.x_asn1_length.patch - () http://download.strongswan.org/patches/07_asn1_length_patch/strongswan-4.3.x_asn1_length.patch -
References () http://download.strongswan.org/patches/07_asn1_length_patch/strongswan-4.x.x_asn1_length.patch - Patch () http://download.strongswan.org/patches/07_asn1_length_patch/strongswan-4.x.x_asn1_length.patch - Patch
References () http://lists.opensuse.org/opensuse-security-announce/2009-10/msg00001.html - () http://lists.opensuse.org/opensuse-security-announce/2009-10/msg00001.html -
References () http://lists.opensuse.org/opensuse-security-announce/2009-11/msg00004.html - () http://lists.opensuse.org/opensuse-security-announce/2009-11/msg00004.html -
References () http://secunia.com/advisories/36922 - () http://secunia.com/advisories/36922 -
References () http://up2date.astaro.com/2009/08/up2date_7505_released.html - () http://up2date.astaro.com/2009/08/up2date_7505_released.html -
References () http://www.debian.org/security/2009/dsa-1899 - () http://www.debian.org/security/2009/dsa-1899 -
References () http://www.openwall.com/lists/oss-security/2009/07/27/1 - () http://www.openwall.com/lists/oss-security/2009/07/27/1 -
References () http://www.vupen.com/english/advisories/2009/2247 - () http://www.vupen.com/english/advisories/2009/2247 -
References () https://lists.strongswan.org/pipermail/announce/2009-July/000056.html - Patch () https://lists.strongswan.org/pipermail/announce/2009-July/000056.html - Patch

Information

Published : 2009-08-04 16:30

Updated : 2024-11-21 01:05


NVD link : CVE-2009-2661

Mitre link : CVE-2009-2661

CVE.ORG link : CVE-2009-2661


JSON object : View

Products Affected

strongswan

  • strongswan
CWE
CWE-310

Cryptographic Issues