Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2017-9022

Опубликовано: 08 июн. 2017
Источник: debian
EPSS Низкий

Описание

The gmp plugin in strongSwan before 5.5.3 does not properly validate RSA public keys before calling mpz_powm_sec, which allows remote peers to cause a denial of service (floating point exception and process crash) via a crafted certificate.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
strongswanfixed5.5.1-4package

Примечания

  • upstream fix https://git.strongswan.org/?p=strongswan.git;a=commit;h=6681d98d18d24b31410fc12c3d61f150107481b3

EPSS

Процентиль: 73%
0.00826
Низкий

Связанные уязвимости

CVSS3: 7.5
ubuntu
около 8 лет назад

The gmp plugin in strongSwan before 5.5.3 does not properly validate RSA public keys before calling mpz_powm_sec, which allows remote peers to cause a denial of service (floating point exception and process crash) via a crafted certificate.

CVSS3: 5.9
redhat
около 8 лет назад

The gmp plugin in strongSwan before 5.5.3 does not properly validate RSA public keys before calling mpz_powm_sec, which allows remote peers to cause a denial of service (floating point exception and process crash) via a crafted certificate.

CVSS3: 7.5
nvd
около 8 лет назад

The gmp plugin in strongSwan before 5.5.3 does not properly validate RSA public keys before calling mpz_powm_sec, which allows remote peers to cause a denial of service (floating point exception and process crash) via a crafted certificate.

CVSS3: 7.5
github
около 3 лет назад

The gmp plugin in strongSwan before 5.5.3 does not properly validate RSA public keys before calling mpz_powm_sec, which allows remote peers to cause a denial of service (floating point exception and process crash) via a crafted certificate.

suse-cvrf
около 8 лет назад

Security update for strongswan

EPSS

Процентиль: 73%
0.00826
Низкий