Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2025-62291

Опубликовано: 16 янв. 2026
Источник: debian

Описание

In the eap-mschapv2 plugin (client-side) in strongSwan before 6.0.3, a malicious EAP-MSCHAPv2 server can send a crafted message of size 6 through 8, and cause an integer underflow that potentially results in a heap-based buffer overflow.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
strongswanfixed6.0.3-1package

Примечания

  • https://www.strongswan.org/blog/2025/10/27/strongswan-vulnerability-(cve-2025-62291).html

  • Patch: https://download.strongswan.org/security/CVE-2025-62291/

Связанные уязвимости

CVSS3: 8.1
ubuntu
22 дня назад

In the eap-mschapv2 plugin (client-side) in strongSwan before 6.0.3, a malicious EAP-MSCHAPv2 server can send a crafted message of size 6 through 8, and cause an integer underflow that potentially results in a heap-based buffer overflow.

CVSS3: 8.1
nvd
22 дня назад

In the eap-mschapv2 plugin (client-side) in strongSwan before 6.0.3, a malicious EAP-MSCHAPv2 server can send a crafted message of size 6 through 8, and cause an integer underflow that potentially results in a heap-based buffer overflow.

suse-cvrf
2 месяца назад

Security update for strongswan

suse-cvrf
3 месяца назад

Security update for strongswan

suse-cvrf
3 месяца назад

Security update for strongswan