The ASN.1 parser in strongSwan before 5.5.3 improperly handles CHOICE types when the x509 plugin is enabled, which allows remote attackers to cause a denial of service (infinite loop) via a crafted certificate.
References
Link | Resource |
---|---|
http://www.ubuntu.com/usn/USN-3301-1 | Third Party Advisory |
http://www.securityfocus.com/bid/98756 | Third Party Advisory VDB Entry |
http://www.debian.org/security/2017/dsa-3866 | Third Party Advisory |
https://www.strongswan.org/blog/2017/05/30/strongswan-vulnerability-(cve-2017-9023).html |
Configurations
Information
Published : 2017-06-08 09:29
Updated : 2019-10-02 17:03
NVD link : CVE-2017-9023
Mitre link : CVE-2017-9023
JSON object : View
CWE
Products Affected
strongswan
- strongswan