Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-5ccj-qrf4-3667

Опубликовано: 17 мая 2022
Источник: github
Github: Не прошло ревью

Описание

The IKE daemon in strongSwan 4.3.x before 4.3.7 and 4.4.x before 4.4.1 does not properly check the return values of snprintf calls, which allows remote attackers to execute arbitrary code via crafted (1) certificate or (2) identity data that triggers buffer overflows.

The IKE daemon in strongSwan 4.3.x before 4.3.7 and 4.4.x before 4.4.1 does not properly check the return values of snprintf calls, which allows remote attackers to execute arbitrary code via crafted (1) certificate or (2) identity data that triggers buffer overflows.

EPSS

Процентиль: 90%
0.05728
Низкий

Дефекты

CWE-94

Связанные уязвимости

ubuntu
больше 15 лет назад

The IKE daemon in strongSwan 4.3.x before 4.3.7 and 4.4.x before 4.4.1 does not properly check the return values of snprintf calls, which allows remote attackers to execute arbitrary code via crafted (1) certificate or (2) identity data that triggers buffer overflows.

nvd
больше 15 лет назад

The IKE daemon in strongSwan 4.3.x before 4.3.7 and 4.4.x before 4.4.1 does not properly check the return values of snprintf calls, which allows remote attackers to execute arbitrary code via crafted (1) certificate or (2) identity data that triggers buffer overflows.

debian
больше 15 лет назад

The IKE daemon in strongSwan 4.3.x before 4.3.7 and 4.4.x before 4.4.1 ...

EPSS

Процентиль: 90%
0.05728
Низкий

Дефекты

CWE-94