The ASN.1 parser in strongSwan before 5.5.3 improperly handles CHOICE types when the x509 plugin is enabled, which allows remote attackers to cause a denial of service (infinite loop) via a crafted certificate.
References
Link | Resource |
---|---|
http://www.debian.org/security/2017/dsa-3866 | Third Party Advisory |
http://www.securityfocus.com/bid/98756 | Third Party Advisory VDB Entry |
http://www.ubuntu.com/usn/USN-3301-1 | Third Party Advisory |
https://www.strongswan.org/blog/2017/05/30/strongswan-vulnerability-%28cve-2017-9023%29.html |
Configurations
History
07 Nov 2023, 02:50
Type | Values Removed | Values Added |
---|---|---|
References |
|
|
Information
Published : 2017-06-08 16:29
Updated : 2024-02-28 16:04
NVD link : CVE-2017-9023
Mitre link : CVE-2017-9023
CVE.ORG link : CVE-2017-9023
JSON object : View
Products Affected
strongswan
- strongswan
CWE