Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2017-9022

Опубликовано: 30 мая 2017
Источник: redhat
CVSS3: 5.9
EPSS Низкий

Описание

The gmp plugin in strongSwan before 5.5.3 does not properly validate RSA public keys before calling mpz_powm_sec, which allows remote peers to cause a denial of service (floating point exception and process crash) via a crafted certificate.

Отчет

This issue did not affect the versions of strongimcv as shipped with Red Hat Enterprise Linux 7, as they did not include support for the gmp plugin.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 7strongimcvNot affected

Показывать по

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-20
https://bugzilla.redhat.com/show_bug.cgi?id=1457121strongswan: Insufficient validation of RSA public keys passed to the gmp plugin

EPSS

Процентиль: 77%
0.01034
Низкий

5.9 Medium

CVSS3

Связанные уязвимости

CVSS3: 7.5
ubuntu
почти 9 лет назад

The gmp plugin in strongSwan before 5.5.3 does not properly validate RSA public keys before calling mpz_powm_sec, which allows remote peers to cause a denial of service (floating point exception and process crash) via a crafted certificate.

CVSS3: 7.5
nvd
почти 9 лет назад

The gmp plugin in strongSwan before 5.5.3 does not properly validate RSA public keys before calling mpz_powm_sec, which allows remote peers to cause a denial of service (floating point exception and process crash) via a crafted certificate.

CVSS3: 7.5
debian
почти 9 лет назад

The gmp plugin in strongSwan before 5.5.3 does not properly validate R ...

CVSS3: 7.5
github
почти 4 года назад

The gmp plugin in strongSwan before 5.5.3 does not properly validate RSA public keys before calling mpz_powm_sec, which allows remote peers to cause a denial of service (floating point exception and process crash) via a crafted certificate.

suse-cvrf
почти 9 лет назад

Security update for strongswan

EPSS

Процентиль: 77%
0.01034
Низкий

5.9 Medium

CVSS3