Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2023-41913

Опубликовано: 07 дек. 2023
Источник: debian
EPSS Средний

Описание

strongSwan before 5.9.12 has a buffer overflow and possible unauthenticated remote code execution via a DH public value that exceeds the internal buffer in charon-tkm's DH proxy. The earliest affected version is 5.3.0. An attack can occur via a crafted IKE_SA_INIT message.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
strongswanfixed5.9.12-1package

Примечания

  • https://www.strongswan.org/blog/2023/11/20/strongswan-vulnerability-(cve-2023-41913).html

  • Patches: https://download.strongswan.org/security/CVE-2023-41913/

EPSS

Процентиль: 93%
0.1093
Средний

Связанные уязвимости

CVSS3: 9.8
ubuntu
больше 1 года назад

strongSwan before 5.9.12 has a buffer overflow and possible unauthenticated remote code execution via a DH public value that exceeds the internal buffer in charon-tkm's DH proxy. The earliest affected version is 5.3.0. An attack can occur via a crafted IKE_SA_INIT message.

CVSS3: 9.8
nvd
больше 1 года назад

strongSwan before 5.9.12 has a buffer overflow and possible unauthenticated remote code execution via a DH public value that exceeds the internal buffer in charon-tkm's DH proxy. The earliest affected version is 5.3.0. An attack can occur via a crafted IKE_SA_INIT message.

CVSS3: 9.8
msrc
больше 1 года назад

Описание отсутствует

suse-cvrf
больше 1 года назад

Security update for strongswan

suse-cvrf
больше 1 года назад

Security update for strongswan

EPSS

Процентиль: 93%
0.1093
Средний