Summary: | <net-misc/strongswan-{4.2.17,4.3.3}: Incomplete fix for CVE-2009-2185 (CVE-2009-2661) | ||
---|---|---|---|
Product: | Gentoo Security | Reporter: | Alex Legler (RETIRED) <a3li> |
Component: | Vulnerabilities | Assignee: | Gentoo Security <security> |
Status: | RESOLVED FIXED | ||
Severity: | trivial | CC: | maintainer-needed, wschlich |
Priority: | High | ||
Version: | unspecified | ||
Hardware: | All | ||
OS: | Linux | ||
URL: | https://lists.strongswan.org/pipermail/announce/2009-July/000056.html | ||
Whiteboard: | ~3 [noglsa] | ||
Package list: | Runtime testing required: | --- |
Description
Alex Legler (RETIRED)
2009-07-27 13:05:11 UTC
Fixed in CVS. Sorry security@gentoo.org, I should not have closed this bug on my own :) thanks, this can be closed indeed. CVE-2009-2661 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-2661): The asn1_length function in strongSwan 2.8 before 2.8.11, 4.2 before 4.2.17, and 4.3 before 4.3.3 does not properly handle X.509 certificates with crafted Relative Distinguished Names (RDNs), which allows remote attackers to cause a denial of service (pluto IKE daemon crash) via malformed ASN.1 data. NOTE: this is due to an incomplete fix for CVE-2009-2185. check-todo-issues put the summary wrong, fixed. |