Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2009-2661

Опубликовано: 04 авг. 2009
Источник: ubuntu
Приоритет: medium
EPSS Низкий
CVSS2: 5

Описание

The asn1_length function in strongSwan 2.8 before 2.8.11, 4.2 before 4.2.17, and 4.3 before 4.3.3 does not properly handle X.509 certificates with crafted Relative Distinguished Names (RDNs), which allows remote attackers to cause a denial of service (pluto IKE daemon crash) via malformed ASN.1 data. NOTE: this is due to an incomplete fix for CVE-2009-2185.

РелизСтатусПримечание
dapper

DNE

devel

not-affected

4.3.2-1.1ubuntu1
hardy

ignored

end of life
intrepid

ignored

end of life, was needs-triage
jaunty

ignored

end of life
karmic

ignored

end of life
lucid

not-affected

4.3.2-1.1ubuntu1
maverick

not-affected

4.3.2-1.1ubuntu1
natty

not-affected

4.3.2-1.1ubuntu1
oneiric

not-affected

4.3.2-1.1ubuntu1

Показывать по

Ссылки на источники

EPSS

Процентиль: 82%
0.01793
Низкий

5 Medium

CVSS2

Связанные уязвимости

nvd
больше 16 лет назад

The asn1_length function in strongSwan 2.8 before 2.8.11, 4.2 before 4.2.17, and 4.3 before 4.3.3 does not properly handle X.509 certificates with crafted Relative Distinguished Names (RDNs), which allows remote attackers to cause a denial of service (pluto IKE daemon crash) via malformed ASN.1 data. NOTE: this is due to an incomplete fix for CVE-2009-2185.

debian
больше 16 лет назад

The asn1_length function in strongSwan 2.8 before 2.8.11, 4.2 before 4 ...

github
больше 3 лет назад

The asn1_length function in strongSwan 2.8 before 2.8.11, 4.2 before 4.2.17, and 4.3 before 4.3.3 does not properly handle X.509 certificates with crafted Relative Distinguished Names (RDNs), which allows remote attackers to cause a denial of service (pluto IKE daemon crash) via malformed ASN.1 data. NOTE: this is due to an incomplete fix for CVE-2009-2185.

EPSS

Процентиль: 82%
0.01793
Низкий

5 Medium

CVSS2