CVE-2009-2661
Published: 4 August 2009
The asn1_length function in strongSwan 2.8 before 2.8.11, 4.2 before 4.2.17, and 4.3 before 4.3.3 does not properly handle X.509 certificates with crafted Relative Distinguished Names (RDNs), which allows remote attackers to cause a denial of service (pluto IKE daemon crash) via malformed ASN.1 data. NOTE: this is due to an incomplete fix for CVE-2009-2185.
Priority
Status
Package | Release | Status |
---|---|---|
strongswan Launchpad, Ubuntu, Debian |
dapper |
Does not exist
|
hardy |
Ignored
(end of life)
|
|
intrepid |
Ignored
(end of life, was needs-triage)
|
|
jaunty |
Ignored
(end of life)
|
|
karmic |
Ignored
(end of life)
|
|
lucid |
Not vulnerable
(4.3.2-1.1ubuntu1)
|
|
maverick |
Not vulnerable
(4.3.2-1.1ubuntu1)
|
|
natty |
Not vulnerable
(4.3.2-1.1ubuntu1)
|
|
oneiric |
Not vulnerable
(4.3.2-1.1ubuntu1)
|
|
upstream |
Needs triage
|